1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sesenic [268]
3 years ago
12

Write code that prints: Ready! firstNumber ... 2 1 Run!

Computers and Technology
1 answer:
motikmotik3 years ago
3 0

Answer:

The program to this question can be defined as follows:

Program:

num=int(input("Enter any number: ")) #defining variable num, that take value from user

val=0; #defining variable val

for i in range(num): #defining loop to calculate value in decreasing order

   val=num-i; #holding value in variable

   print(val) #print value

Output:

Enter any number: 3

3

2

1

Explanation:

In the above-given code, a variable "num" is declared, that uses input function to take value from the user end, in the next line a "val" variable is defined, that calculates values and print it in decreasing order.

  • In the next step, a for loop is declared, inside the loop a "val" variable uses num and loop variable "i" to calculate the value in decreasing order.
  • In the last print method is used that prints "val" variable value.
You might be interested in
When a number gets assigned to a variable that already has a value __________. the new number overwrites the previous value at t
sammy [17]

Answer: the new number overwrites the previous value at that memory location

Explanation:

8 0
3 years ago
How do i give brainliest? if what you say works i'll give de brain
ololo11 [35]

two people have to answer the question and at the bottom of the question you'll see a crown and you just click on that to give them brainliest

6 0
3 years ago
Read 2 more answers
What are the possible consequences of intentional virus setting?
natali 33 [55]

<u>The possible consequences of intentional virus setting:</u>

Virus is nothing but desktop or laptop or tablet OS has to do certain process as on its own which diverse other  to different process  such us stealing the data from desktop or laptop or tablet and making slow the performance of desktop and laptop  and tablet.

To avoid or protect the computer there are two type of antivirus.

  • On desktop or tablet or laptop. (It is called resident firewall).
  • Internet gateway. (It is called firewall)

So company create virus and to rectify they make money of that process.

To protect our desktop or laptop or tablet from virus we are protected with law. In case due to virus attacked our laptop or desktop or tablet Is effected we can fine the or sent to jail by law.

3 0
3 years ago
Patricia's partner Alex has shared a spreadsheet he created. On the first row he has given the spreadsheet a title. The title ap
Alexxandr [17]

Answer:

Merge cells A1:E1 and centre the title text in the merged cell.

Explanation:

In order for the title of the shared spreadsheet document to appear centred in the first row above the other five columns, Patricia will be required to merge the first row A1 with the fifth row E1 and centre the title text in the merged cells. This increases the number of rows  and columns of the spreadsheet as the information in the other cells will be shifted down.

3 0
3 years ago
A stepping function allows a program
vichka [17]

Answer:

To be inspected line by line.

Explanation:

8 0
4 years ago
Read 2 more answers
Other questions:
  • While ________ is centered on creating procedures, ________ is centered on creating objects. Procedural programming, class progr
    10·1 answer
  • Brent is using customer reviews from a reputable online store to help him determine whether or not he should buy a particular la
    10·1 answer
  • 9) If you are working on the part of 5-15 minutes, time-stamping (every 30 seconds) should start at: a) [00:05:00] b) [00:00:00]
    13·1 answer
  • O que é sistema distribuido?
    8·1 answer
  • in python Write a loop that counts the number of lowercase characters that appear in the string referenced by mystring.
    11·1 answer
  • Consider a direct-mapped cache with 256 blocks where block size is 16 bytes. The following memory addresses are referenced: 0x00
    7·1 answer
  • Use the drop-down menus
    9·2 answers
  • Do you play Rocket League
    10·2 answers
  • Which type of relationship is responsible for teaching you values and how to communicate?
    9·1 answer
  • Which source would provide the best way to find valid information about climate change
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!