First of all, the print statements should be indented, and the last if statement should be x % 2 == 1 inside of the parentheses.
Other than those few mistakes, the output of the program when the user types in 9 is:
A
C
and whatever the last thing is in the final if statement.
I hope this helps!
Answer: Stealth/Tunneling Virus
Explanation: Stealth or tunneling virus are the virus which are responsible for attacking a computer system which causes the problem in the functioning of the operating system by manipulating files, creating partition etc.
These viruses try to avoid or prevent the anti-virus scans for the detection any sort of virus or error . They act to prevent any malfunction detection by taking charge for the anti-virus operation.
Answer:
A blog.
Explanation:
A blog can be defined as an informative or discussion-based website that is updated regularly and published over the internet. The informations that are posted on a blog are usually done chronologically and it includes pictures, videos, music, movies, novels, etc.
In this scenario, Kyra is teaching a photography class. She would like her students to share photos, be able to review other students' photos and offer feedback.
Hence, the technology Kyra should use is a blog because it would avail the users (students) to post photos, make comments on blog posts and review items posted by others.
anything
Explanation:
I know what to say this time
In order to be able to listen to your music, a sound card converts digital data to analog sound waves you can hear. The output signal is then connected to a headphone or set of speakers. You can also use a sound card to record audio with a microphone