1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nordsb [41]
3 years ago
7

Python 3.4

Computers and Technology
1 answer:
Dmitrij [34]3 years ago
8 0
I = 0
while( i < ( n * 2 ) ):
   s += '*'
   i += 1
You might be interested in
Taking an online class doesn't require any special skills.
mr_godi [17]

Answer:

F

Explanation:

It depends on whether the person has interest in it

5 0
3 years ago
Read 2 more answers
What are the pros and cons of using the internet in a medical office setting?
konstantin123 [22]
Pros:
-They can share information between different medical offices quicker than they could before hand.
-It is cheaper to send information via the internet than it is to hand it by hand

Cons:
-Hackers can get access to the medical patient's information.
-The upkeep costsof the internet connection may lower their income.
7 0
3 years ago
____________ are the in – built functions that perform a particular pre – defined task when used in a computer program.
saveliy_v [14]

Answer:

System software.

Explanation:

System software are the in-built functions that perform a particular pre-defined task when used in a computer program. An example of a system software is an operating system.

An operating system (OS) is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes. Some examples of an operating system are QNX, Linux, OpenVMS, MacOS, Microsoft windows, IBM, Solaris, VM etc.

4 0
3 years ago
Do you think privacy policies are effective in social networking sites?
Kamila [148]

Answer:

When that information gets posted online, it is no longer private, and may end up falling into wrong hands. Even if you have put in place the highest possible security measures, some of your friends, colleagues and companies you interact with on social media, can end up leaking your personal information.

4 0
3 years ago
Circular errors are caused by adding the cell name of a/an _______ cell to a formula.
Alex777 [14]
The word you are looking for is active.
4 0
3 years ago
Other questions:
  • Background Susan finished work on system architecture issues, and her system design specification was approved. Now she is ready
    15·1 answer
  • The algorithm ADDN implements N-bit fixed-width binary addition for non-negative integers and ignores overflows. For example, AD
    13·1 answer
  • Complexities of communication are organized into successive layers of protocols: lower-level layers are more specific to medium,
    8·1 answer
  • A user calls to report that she is experiencing intermittent problems while accessing the wireless network form her laptop compu
    9·1 answer
  • What was the original motivation for developing the internet?
    7·1 answer
  • Which tab automatically becomes available after inserting a text box? Drawing Tools Insert Text Box Tools Shape Tools
    15·2 answers
  • In many supermarkets customers can pay for their shopping using credit cards. (a) Name two items of information stored on the ma
    8·1 answer
  • You want a cable that could be used as a bus segment for your office network. The cable should also be able to support up to 100
    5·1 answer
  • What is Japanese tradition?
    8·2 answers
  • What is a circular network.​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!