1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sophie [7]
3 years ago
14

2.5 code practice I need answers please

Computers and Technology
1 answer:
Leni [432]3 years ago
7 0

Answer:

import random

a = random.randint(1,10)

b = random.randint(1,10)

answer = a * b

print (str(a) + " X " + str(b) + " = " + str(answer))

Explanation:

Happy to help you mate

You might be interested in
What is the abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages, many of which contain hoax
Ilya [14]

I think the answer is spam
5 0
3 years ago
our client, Rhonda, has come to you for advice. Rhonda has recently graduated from college and has a good job with a large compa
Radda [10]

Answer:

See explaination for how to manage her personal risk

Explanation:

Personal risks can be described as anything that exposes you to lose of money. It is often connection to financial investments and insurance.

The basic things She can do to manage her personal risks are:

1. Saving:

Savings in much ways drastically reduces the percentage of risks and help you build confidence. Savings can help Rhonda manage her personal risks as savings helps one become financially secure and provide safety in case of emergency.

2. Investing:

After savings comes the major process, which is investment. It is rightly said, savings without invested proper is vain. Investment not only gives you returns or generates more profits but also ensures present and future long term financial security.

3. Reduce expenses:

A common man's expenses can never finish except it is controlled. Reduction in daily expenses can give a hike in savings and increase return on investment. Prompt planning can help cut in expenses.

5 0
3 years ago
Byte pair encoding is a data encoding technique. The encoding algorithm looks for pairs of characters that appear in the string
erica [24]

Answer:

C. Byte pair encoding is an example of a lossless transformation because an encoded string can be restored to its original version.

Explanation:

Byte pair encoding is a form of encoding in which the most common pairs of consecutive bytes of data are replaced by a single byte which does not occur within the set of data.

For example, if we has a string ZZaaAb, it can be encoded if the pairs of string ZZ are replaced by X and the second pair by Y. So, our data now becomes XYAb.

To get our original data, that is decode it, we just replace the data with the keys X = ZZ and Y = aa thus allowing our original data to be restored.

Since our original string is restored without loss of data, it implies that <u>byte pair encoding is an example of a lossless transformation because an encoded string can be restored to its original version.</u>

8 0
3 years ago
Why do we need multitasking functionality in an Operating System?
Leokris [45]

Answer:

Multitasking is a process in which we do multiple task at a time.    

In computing system, multitasking is the concept of performing different types of multiple task and process over a certain period of time by executing simultaneously.

Operating system basically allow various task to run simultaneously by the user. In an operating system, each task consume storage system and all the other resources.

Multitasking function facilitate memory isolation in the processor and also supported different levels of security system in the operating system. For example, "a programmer working on any program in a system and as well as listening the music then, it perform multiple task at the same time".

7 0
3 years ago
How might a company gain followers on Twitter?
Tresset [83]
By sending persuasive / informable and interesting posts to gain followers.
3 0
3 years ago
Other questions:
  • Which of these is NOT an advantage of the impact of computer careers.
    9·1 answer
  • What happens if you never confirm your facebook account?
    8·1 answer
  • What is virtualization?
    11·2 answers
  • How does cryptocurrency exchange software works?
    14·1 answer
  • An address has a house number, a street, an optional apartment number, a city, a state and a postal code. Define the constructor
    5·1 answer
  • A large company has a LAN. The manager of the company wants to change it to a WAN
    10·1 answer
  • Laptop computers use PCMCIA cards, another type of ________
    15·1 answer
  • Edhesive 2.3 code practice question 1​
    11·1 answer
  • A while loop uses a(n) ___________ at the top of every iteration to test whether to continue or not.
    13·1 answer
  • Suppose a large group of people in a room were all born in the same year. Consider the following three algorithms, which are eac
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!