1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleks04 [339]
3 years ago
11

Write a program that reads a list of integers into a list as long as the integers are greater than zero, then outputs the smalle

st and largest integers in the list.

Computers and Technology
1 answer:
almond37 [142]3 years ago
4 0

Answer:

Check the explanation

Explanation:

10

5

3

21

2

-6

the output will be somthing like this:

2 21

You can then suppose that the list of integers will contain at least 2 values.

You might be interested in
What is the correct term for a set of established guidelines for actions (which may be designated by individuals, teams, functio
serg [7]

Answer: Protocol

Explanation: Protocol is the standard that is used in the communication and electronic devices for the communication. Through the mean of the these guidelines the communication is done by the sending and receiving of the data.

This works for the both wired networking and wireless communication which functions under the certain conditions.Examples-TCP(Transmission control protocol), FTP(File transfer protocol) etc.

5 0
3 years ago
For delivering a message that is straightforward and informative, a face-to-face encounter is preferred over a technological cha
avanturin [10]

Answer: True

Explanation:

7 0
4 years ago
escribe and explain at least three improvements you think came about with the introduction of intrusion prevention technology. J
katrin2010 [14]

Answer:

Due to Brainly's policy on answering questions, posting links as "credible source." is prohibited, but you can let me know in case you'll still want to know the "credible source."

Explanation:

The three improvements you think came about with the introduction of intrusion prevention technology are:

1.The prevention of intruders from attacking the database

2.The data is protected and is more secured as the intruders are removed from the network.

3.The  data is not changed and misused as hackers cannot access it

The best feature which is can be termed as the most beneficial is that data is not changed neither can it be misused as the company's data is secured and protected from the outside world and the data can be used effectively and efficiently without any major changes.This means the company does not suffer any losses due to hacking of data.

8 0
3 years ago
Given that the input A is false, the input B is false, and the input C is true, what is the resulting value of the output?
Debora [2.8K]

Answer:

out put is false

Explanation:

I hope it's helpful

6 0
2 years ago
What is the descriptor for a filter that warns or blocks you from potentially fraudulent or suspicious websites?.
algol [13]
A VPN. i believe what you’re referring to is called a vpn. it protects your data when you’re working online.
8 0
2 years ago
Other questions:
  • Which of the following is true of how the Internet has responded to the increasing number of devices now using the network? a) T
    12·2 answers
  • Write an algorithm that receives 500 numbers from the user and prints out the maximum of the numbers.
    9·1 answer
  • What is the simple way to permanently get rid of an unwanted file
    14·1 answer
  • Design a ROM of size 64X8 bit in VHDL. Your ROM takes as input an address and a clock and output the content of the ROM at the c
    7·1 answer
  • The dramatic increase in the number of people having access to the Internet has been made possible, in part, because of the rela
    8·1 answer
  • Does this look anywhere close to the APA Format?
    6·1 answer
  • What does RFID use for wireless communication?<br> Infrared<br> IoT<br> Smart chip<br> Tag
    14·1 answer
  • What is the 5 basic steps of computer programing?
    6·1 answer
  • Please can someone help my assignment.​
    13·1 answer
  • To execute a command object and store the results in a dataset, you use the Group of answer choices Fill method of a data adapte
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!