1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Over [174]
3 years ago
8

Write a program using integers user_num and x as input, and output user_num divided by x three times. Ex: If the input is: 2000

2 Then the output is: 1000 500 250
Computers and Technology
2 answers:
sveticcg [70]3 years ago
7 0

Answer:

user_num = int(input("Number: "))

x = int(input("x: "))

for i in range(1,4):

    user_num = user_num/x

    print(user_num," ")

Explanation:

LenaWriter [7]3 years ago
3 0

Answer:

Soory! I can't tell please tell clearly

You might be interested in
your manager asked you to set up a secure network connection at a remote site to move over some back ups. what protocol what do
Ivan

The protocol that should be used to establish a secure network connection for backups is SSH.

<h3>Secure Shell</h3>

SSH stands for <u>Secure Shell</u>. SSH is a <u>protocol that allows users to remotely control and modify servers</u>. SSH is commonly used by administrators to manage certain systems or applications remotely. So the admin can enter the computer via the network, then run various commands to modify or manage files from one computer to another.

SSH has several crucial functions for managing data transfer traffic. Specifically, the following are the functions and benefits of SSH:

  • Securing remote access to SSH-enabled systems or network devices for the user and processing them automatically.
  • SSH will automatically terminate the connection if there is suspicious activity on the connection used. So you can avoid various cyber threats such as IP and DNS spoofing, data manipulation, illegal tracking, and others.
  • Perform automatic and secure file transfers.
  • Launch commands securely on remote devices or systems.
  • Perform secure component management of network infrastructure.

Learn more about Secure network connection: brainly.com/question/28083478

#SPJ4

8 0
1 year ago
In which type of attack do you get malicious code in links from seemingly reliable websites?
natali 33 [55]

I think it is C. cross-site scripting

6 0
3 years ago
anyone got a class named computer literacy? or sum similar to using Microsoft programs? i need a lotttt of help, im 3 units behi
seropon [69]

Answer:

I use google docs

Explanation:

I am in 6th grade but i am in expert in computers.

6 0
4 years ago
Read 2 more answers
The variable sentence stores a string. Write code to determine how many words in sentence start and end with the same letter, in
irina [24]

Answer:

sentence = "hello wow a stores good"

same_letter_count = 0

sentence_list = sentence.split()

for s in sentence_list:

   if s[0] == s[-1]:

       same_letter_count += 1

print(same_letter_count)

Explanation:

*The code is in Python.

Initialize the sentence with a string

Initialize the same_letter_count as 0

Split the sentence using split method and set it to the sentence_list

Create a for loop that iterates through the sentence_list. If the first and last of the letters of a string are same, increment the same_letter_count by 1

When the loop is done, print the same_letter_count

4 0
3 years ago
Positive and negative impacts of chemical industries
Nonamiya [84]
5. Positive and Negative Impact of chemical industries. Here are the positive impacts first: => It can discover a chemical product that can be helpful for us humans like physical beautification, medicines to a certain diseases and more that is beneficial to our health. => It can also help us learn more about the chemicals that is presents in our planet. Here are the lists of the negative impacts: => Some Chemicals can be harmful to the nature and also to our body. => Some chemical can cause diseases especially those harmful ones.
4 0
3 years ago
Read 2 more answers
Other questions:
  • Janice has a "jammed" key on her keyboard. Every time she strikes the "S" key it sticks and doesn't pop back. What should Janice
    6·2 answers
  • Which of the following is needed if a computer with the IP address 172.31.210.10/24 wants to communicate with a computer with th
    5·1 answer
  • Given the security levels TOP SECRET, SECRET, CONFIDENTIAL, and UNCLASSIFIED (ordered from highest to lowest), and the categorie
    13·1 answer
  • While surfing online, Patricia checks her email and reads the latest messages. She then browsers a website and logs in a comment
    8·1 answer
  • Which would be included in a SaaS platform?<br><br> A.data link<br> B.IaaS<br> C.Java<br> D.vb.net
    5·1 answer
  • private int product(int n) { if(n &lt;= 1) return 1; else return n * product(n-2); } What is the output when product(6) is calle
    6·1 answer
  • What is GND and what color wire do we connect to GND? (this is like for circuits and stuff btw)
    7·1 answer
  • me pueden ayudar con mi trabajo sii porfss si me dan la respuesta correcta y les doy la mejor coronita si​
    12·1 answer
  • Resumen sobre Tailandia​
    10·1 answer
  • Verbs in the active and passive voice
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!