1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lesantik [10]
3 years ago
5

Put the steps in order to produce the output shown below. Assume the indenting will be correct in the program.

Computers and Technology
1 answer:
FromTheMoon [43]3 years ago
3 0
For numb in [5,8]:
for numa in [2,3]:
print(str(numb) + str(numa))
You might be interested in
my pc wants to run the highest graphics even though I restart it everyday and it gets around 10 fps and I have a 1080 Nvidia gra
Luden [163]

Answer:

you have to restart the rom , if that doesnt work , start the ram

Explanation:

5 0
3 years ago
How can you get access to Help in Excel? Which of the following are correct ways to get to help?
kvv77 [185]

1. F1

3.Lightbulb

5.tell me what you want to do

6. the ? on the top-right corner in backstage view​

6 0
3 years ago
Which data type could be used for the field, remark or comment? ​
katrin2010 [14]

Answer:

While CLOB/NCLOB types may seem attractive, they are not nearly as efficent as [N]VARCHAR for most of the functions you would usually want to run on them, and anyone who can't comment in 2000 or 4000 characters isn't likey to generate a comment you'd want to use anyway.

copied from google

hope that helps

3 0
3 years ago
१८. तलका शीर्षकमा १५० शब्दसम्मको निबन्ध लेख्नुहोस् :<br>(क) सुशासन र विकास<br>​
inn [45]

Answer:

n

Explanation:

8 0
3 years ago
Read 2 more answers
When VPN network traffic is routing only some traffic over the secure VPN while other traffic directly accesses the Internet, wh
stiv31 [10]

Answer:

split tunneling

Explanation:

Based on the information provided within the question it can be said that in this scenario the type of technology being used is known as split tunneling. Like mentioned in the question this refers to when a user is able to access different security domains such as a public network and a WAN at the same time. This can either be done with the same or different network connections.  

3 0
3 years ago
Other questions:
  • Which of the following is NOT a way the media communicates unrealistic body images?
    10·2 answers
  • How does making a phone call differ when using: A public phone A cell phone
    6·1 answer
  • Windows server 2012 r2 supports two types of folder shares. what are those two types?
    6·1 answer
  • Shelby likes to play video games on an old Atari video game system. No matter how old the cartridge, when she inserts it into th
    14·2 answers
  • Name some technologies that engineers create
    13·1 answer
  • In this problem, we explore some of the properties of the CRC. For the generator G (=1001) given in Section 5.2.3, answer the fo
    14·1 answer
  • Projects used for print and web have different ?
    5·1 answer
  • Fill in the blanks : To store 3 character a computer occupies...................bytes memory space​
    8·2 answers
  • Which of the following is NOT a common grammar adjustment which is identified by grammar-check software?
    6·1 answer
  • You have 5 salespersons who work out of your office and who frequently leave their laptops laying on their desk in their cubicle
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!