1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alisha [4.7K]
3 years ago
12

Programming Objectives

Computers and Technology
1 answer:
erma4kov [3.2K]3 years ago
7 0

Answer:

See Explaination

Explanation:

m=int(input("Please specify the number of elements in first list : "))

n=int(input("Please specify the number of elements in second list : "))

m1=1

list1=[]

n1=1

list2=[]

while m1<=m:

r1=int(input("input element {} of list1: ".format(m1)))

list1.append(r1)

m1+=1

while n1<=n:

list2.append(int(input("input element {} of list2: ".format(n1))))

n1+=1

def Intersection(list1,list2):

return set(list1).intersection(list2)

print("The intersection of two lists is {}".format(Intersection(list1,list2)))

You might be interested in
Device drivers perform the actual communication between physical devices and the operating system. Group of answer choices True
jeka94

Answer:

true

Explanation:

5 0
2 years ago
Carlos works in the IT department at Sample Bank. He uses a cloud-based e-mail system and has been asked by his manager to estab
vodomira [7]

Answer:

Option (A) i.e., Chargeback is the correct answer to the following question.

Explanation:

In the cloud-computing, Chargebacks is used for the metrics on the e-mail box which is used by the departments or the organizations, by this system, department budgets has been billed for the costs of entertain the department e-mails. It is applied on the expenses of the IT sectors or services for the strategies of the accounting.

Option B is incorrect because billback it is an application that are used in organization for needs to determining the resources of IT.

Option C is incorrect because Showback is the policy that is used by the IT for rise the expenses.

7 0
3 years ago
Do you think children should have their own mobile phones? Why or why not?
Svet_ta [14]

Answer:

Yes

Explanation:

I as a parent think children should have their own mobile phone.

Safety reason being the main reason, because there are too many instances with child abductions, school shootings. It's not like it was 30 years ago when I was a child and we could hang out all over the neighborhood and parents knew each other and watched out for everyone's child. In today's society there is so much danger lurking that you have to protect your child the best way you can, and with our children having mobile phones it allows constant contact with our children. Plain and simple in case of emergencies.

5 0
3 years ago
Read 2 more answers
When an event occurs, the agent logs details regarding the event. what is this event called?
Nimfa-mama [501]

If an event occurs, the agent logs details regarding the event. what is this event called GET.

The information in the agent log file is known to be the beginning of the log file, which is stated to show the agent's launch and handling of the services and configuration settings.

Keep in mind that the agent log also contains a history of the activities performed by the agent during runtime, along with any errors, and that it is utilised to investigate deployment issues.

As a result, if an event happens, the agent logs information about it. What is this GET event, exactly?

The agent monitoring services' startup and configuration settings are displayed at the log file's beginning. The sequence of agent runtime activity and any observed exceptions are also included in the agent log.

Learn more about agent logs:

brainly.com/question/28557574

#SPJ4

8 0
1 year ago
What vowel(s)!are Missing in the Word= "a b t" ???
grigory [225]
O AND U which spells ABOUT
5 0
3 years ago
Other questions:
  • What is the correct order of network types when categorized by their size or the physical area they cover, from largest to small
    5·1 answer
  • Using the flowchart diagram, identifythe decision point of this solution?
    6·1 answer
  • When is the bond between the actin and myosin head is broken? when an ATP molecule binds to the myosin head when an ATP molecule
    6·1 answer
  • In which of the following situations will a macro make your work more efficient?
    12·1 answer
  • All wireless networks have their own name, referred to as the ________, which is used to identify the network.
    11·1 answer
  • Cpu coolers are typically made using what two different types of materials?
    6·1 answer
  • What is the grooming process as it relates to online predators?
    12·2 answers
  • Which deployment tool will you use to deploy metadata from one organization to another organization?
    6·1 answer
  • Consider an allocator on a 32-bit system that uses an implicit free list. Each memory block, either allocated or free, has a siz
    11·1 answer
  • How can blockchain be used to support sustainable business practices?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!