1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mario62 [17]
4 years ago
15

Which of the following is not a data type in python Float, string, integer, decimal ​

Computers and Technology
2 answers:
Hunter-Best [27]4 years ago
8 0

Answer:decimal

Explanation:

these are the types:

String, List, Tuple, Associative array, Floating-point, arithmetic, Integer,

Boolean data type, Set

olga_2 [115]4 years ago
6 0
Answer: All are data types except decimal.
You might be interested in
Spam is _____.
AfilCa [17]
Multiple answers. Attachment and practice of sending unwanted messages
6 0
3 years ago
Read 2 more answers
What is the "key" to a Caesar Cipher that someone needs to know (or discover) to decrypt the message? a) A secret word only know
Tpy6a [65]

Answer:

The number of characters to shift each letter in the alphabet.

Explanation:

Caeser Cipher is the technique of encryption of data, to make it secure by adding characters between alphabets. These are the special characters that make the message secure while transmitting.

According to the standards, For Decryption, we remove these special characters between alphabets to make message understandable.

<em>So, we can say that,to de-crypt the message, the number of characters to shift each letter in the alphabet.</em>

3 0
3 years ago
How Extreme Programming addresses Software Testing andevolution ?
kumpel [21]

Answer:

Extreme programming is a software development technique which is used to enhance software quality and it's response to ever changing customer requirements.

Testing

Testing is main focus in extreme programming.Extreme programming addresses testing in a way that if a minute testing can eliminate a bit of flaws, extensive testing can terminate a lot of flaws.

Evolution in Extreme programming is like this:-

Coding:-First programmers will code the problem.

Testing :- Testing is done to remove flaws.

Listening:- Programmers must listen to the customers to what they need.

Designing:-Then design according to the customer needs.

6 0
3 years ago
Define a python functions that draw a pinwheel using the pinwheel function that has input paramiters that allows you to change t
QveST [7]

Start with your draw_pinwheel() function

During each iteration of the loop decide which color to set the turtle to using the color() function

On even iterations, use color1

On odd iterations, use color2

Use an if/else statement to do the decision making

After deciding the color, surround a call to draw_triangle() with begin_fill() and end_fill() so that drawing the triangle creates a colored triangle.

If you have have forgotten, you can use an if/else to check for even/oddness in python as follows.

my_number = 3

if(my_number % 2 == 0):     # the remainder of dividing by 2 is 0

   print("The number is "+str(my_number))

   print("The number is EVEN")

else:                       # the remainder must be 1

   print("The number is "+str(my_number))

   print("The number is ODD")

Good luck <3

8 0
3 years ago
1.Public policy begins with . 2.Then, government officials . 3.Finally, a government agency .
dexar [7]

Answer:

what was the wuestion

Explanation:

cause we dont know how to help you

4 0
3 years ago
Other questions:
  • what is the software that controls the storage, retrieval and manipulation of database stored in a database
    14·1 answer
  • How do you make electricity
    10·1 answer
  • you just bought a new hard drive for your computer, you plan to use this secondary hard drive to store all school work files. on
    13·1 answer
  • What is the full form of ICT?​
    14·2 answers
  • If you have created a document that contains a table that is 10 inches wide and 4 inches high, you will want to print the docume
    6·2 answers
  • 1. How do you identify the location of components and replacement procedures for notebook systems?
    6·1 answer
  • WHAT ARE THE RISK OF DUST​
    15·1 answer
  • List 2 positive impacts of cybersecurity.
    8·2 answers
  • Which longstanding restaurant chain closed its last location in lake george, new york?.
    10·1 answer
  • there are n houses in a row numbered from 1 to n. an array infected houses contains the houses the houses which are infected wit
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!