1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kumpel [21]
3 years ago
6

Open IDLE. Create a new script file (File-->New File, Ctrl n on Windows, Cmd n on macOS). On the first line, place your name

in a comment. Create a program that does the following: Requests an integer number from the user This number will determine the number of rows that will be displayed Print out a header row Displays the current row number, that number multiplied by ten, then multiplied by 100, then multiplied by 1000, in tabular format Repeat this until the required number of rows have been displayed This program must account for the user having stated zero (0) rows should be displayed Your output should resemble the following: Python Output 5
Computers and Technology
1 answer:
Lorico [155]3 years ago
6 0

Answer:

program:

#your name

print("{:10} {:10} {:10}".format("Number","Square","Cube"))

print("{:<10} {:<10} {:<10}".format(0,0,0))

print("{:<10} {:<10} {:<10}".format(1,1,1))

print("{:<10} {:<10} {:<10}".format(2,2**2,2**3))

print("{:<10} {:<10} {:<10}".format(3,3**2,3**3))

print("{:<10} {:<10} {:<10}".format(4,4**2,4**3))

print("{:<10} {:<10} {:<10}".format(5,5**2,5**3))

print("{:<10} {:<10} {:<10}".format(6,6**2,6**3))

print("{:<10} {:<10} {:<10}".format(7,7**2,7**3))

print("{:<10} {:<10} {:<10}".format(8,8**2,8**3))

print("{:<10} {:<10} {:<10}".format(9,9**2,9**3))

print("{:<10} {:<10} {:<10}".format(10,10**2,10**3))

output:

Number Square Cube

0 0 0

1 1 1

2 4 8

3 9 27

4 16 64

5 25 125

6 36 216

7 49 343

8 64 512

9 81 729

10 100 1000

You might be interested in
Select the different network functions from the list below.
VashaNatasha [74]

Answer:

IP address

blocking spam

power

SAN

8 0
3 years ago
You work with alot of different documents in your internship with a software development company. What kinds of actions can you
Doss [256]

Answer:

Explanation:

Try as much as possible, to keep like files together in one folder. Even so there if you run into the hundreds or thousands, that is not going to be an easy thing do.

What ever you do, do clutter up your favorites bar, especially if your favorites spill over into where you have to push a button to get to them. Keep that bar open for what you really need on that bar. Mine has Brainly, Kitco, My Alberta Health, A graphing program, a second graphing program, Amazon, a scrabble word finder, and a couple of other things. It

If you can, try and keep your favorites to something that would be useless to anyone else. My favorites are worthless to anyone else. But I play a lot of scrabble related games.

7 0
3 years ago
Parts are described by partnum, color, and price. Parts can be subassemblies as well and this means that they contain other part
sladkih [1.3K]

Answer:

Attached is the solution:

5 0
3 years ago
LITERALLY PLS ANYONE!!! 90 pointsss!
Doss [256]

7. Intentional Virus Setting is when you the user purposely spread computer viruses in order to do harm. It should be noted that this is highly illegal (no duh) with a sentence of up to 10 years and $250,000 in penalties assuming you are convicted under the Computer Fraud and Abuse Act of 1986 here in the States.

8. intrusion of solitude, appropriation of name or likeness, public disclosure of private facts, and false light.

9.  Intentionally creating and/or sending a virus and infecting people's computers is against the law, and can result in jail time or a fine.

10. Some examples are: Deception - Lying about how information will be used. Violation of confidentiality - Disclosing someone's personal information without consent. Intrusion - Interference in an employee's personal life. Misappropriation - Using a person's likeness to promote a product without his consent.

11. Everyone wants PRIVACY for themselves, and everyone wants ACCOUNTABILITY from others. Privacy is a basic human need, and invasion of privacy can have serious psychological and emotional consequences, including paranoia, anxiety, depression and broken trust. Invasion of privacy is both a legal and an ethical issue.

12. A cause of action for invasion of privacy entitles the plaintiff to recover damages for the harm to the particular element of his or her privacy that is invaded. Thus, one who suffers an intrusion upon his or her solitude or seclusion, may recover damages for the deprivation of his or her seclusion.

13. An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet. Many businesses and educational facilities require that employees or students sign an acceptable use policy before being granted a network ID.

14. Intellectual property refers to creations of the mind: inventions; literary and artistic works; and symbols, names and images used in commerce. Intellectual property is divided into two categories: Industrial Property includes patents for inventions, trademarks, industrial designs and geographical indications.

PLEASE PLEASE PLEASE HELP WITH MY RECENT!!!!!!

btw hope this helps if it does please make brainliest :)

6 0
3 years ago
Read 2 more answers
A report that ends with the author providing his or her plan for next steps is considered a
Angelina_Jolie [31]
The specific part of the report wherein the author would provide his suggestions on the next plans that would be carried out in the study would be the recommendations. In addition, it would open the opportunity to other aspiring researchers to expound and better improve the study.
4 0
3 years ago
Other questions:
  • Dan needs to ensure that delegates as well as those looking at his shared calendar information are unable to see the details of
    7·1 answer
  • What is an efficiency target? Give an example of setting an efficiency target
    11·1 answer
  • Write a switch statement that tests the value of the char variable response and performs the following actions: if response is y
    9·1 answer
  • Good afternoon guys !!!
    14·2 answers
  • How do you find the exterior angle measure of any regular polygon? (The degree in which to turn the turtle to draw a shape)
    10·1 answer
  • What acronym describes networked devices that contain microcomputers but are not thought of as computing devices, such as refrig
    9·1 answer
  • When would it be easier to use Cut and Paste over Drag and Drop? Explain?
    6·1 answer
  • Write a for loop to print all NUM_VALS elements of vector courseGrades, following each element with a space (including the last)
    11·1 answer
  • No careers combine more than one value
    7·1 answer
  • News writers get story leads from____.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!