1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anarel [89]
2 years ago
14

8.7 Code Practice Question 3

Computers and Technology
2 answers:
lorasvet [3.4K]2 years ago
8 0

I included my code in the picture below.

Alexeev081 [22]2 years ago
7 0

Answer:

w = ["Algorithm", "Logic", "Filter", "Software", "Network", "Parameters", "Analyze", "Algorithm", "Functionality", "Viruses"]

s=[]

for x in w:

   s.append(len(x))

for x in range(len(w)):

   print(str(s[x])+": "+str(w[x]))

Explanation:

I got 100%

You might be interested in
You have a host device with an assigned IP address of 192.168.15.100 and a subnet mask of 255.255.255.192. To what network does
aalyn [17]

The options are missing from the question.

Below are the options.

A) 192.168.15.0

B) 192.168.15.16

C) 192.168.15.32

D) 192.168.15.64

Answer: The correct option to the question is option D

192.168.15.64

Explanation:

The Network is: 192.168.15.64/26 11000000.10101000.00001111.01000000

Then the Broadcast is: 192.168.15.127 11000000.10101000.00001111.01111111

We see the HostMin as: 192.168.15.65 11000000.10101000.00001111.01000001

And the HostMax as: 192.168.15.126 11000000.10101000.00001111.01111110

3 0
3 years ago
Explain 3 ways you can be an upstander when seeing cyberbullying.
Bess [88]

Answer:

Assuming an upstander is someone that opposes cyberbullying:

(1) Call them out

(2) Report the behavior to proper moderation authority

(3) Tell the person to block messages from the cyberbully

I don't really know what else you want from this.

Cheers.

3 0
3 years ago
Read 2 more answers
2. Name the three building blocks of design that pertain to form.
inna [77]

Answer:

Point, Line, Shape,Form, Color, Value, and Texture.

Explanation:

The elements of design, are the building blocks used by the designers to create the designs. ...

Point, Line, Shape,Form, Color, Value, and Texture.

3 0
3 years ago
To display the size of your backup file, you can use the Windows program called: Windows Explorer Scan disk Defrag Windows Acces
Nitella [24]
Windows Explorer scan disk
7 0
2 years ago
True or false? the categories of software applications are mutually exclusive
Natali [406]
False, the categories of software applications are not mutually exclusive.
3 0
3 years ago
Read 2 more answers
Other questions:
  • A technology _____ begins with the birth of a new technology and ends when that technology reaches its limits and dies as it is
    13·1 answer
  • Read each scenario, and then select the best wireless device for the worker’s needs. A trucker is constantly on the road. He fre
    8·2 answers
  • Businesses use spreadsheets to keep track of financial________.
    14·1 answer
  • you just bought a new hard drive for your computer .you plan to use this as a secondary hard drive to store alll your files. wha
    15·1 answer
  • ___MSDS provides information on how to handle, store, discard and care for potentially hazardous chemicals. true or false?​
    5·1 answer
  • Which button should be utilized if a user is unsure whether or not they are the right person to reply to an email?
    6·2 answers
  • Write a program to enter a number and test if it is greater than 45.6. If the number entered is greater than 45.6, the program n
    10·1 answer
  • In order to be an effective employee who knows recent information on loans and laws, in what topic should your information be cu
    5·1 answer
  • Remember not to use tools that are ________ in any way.
    5·1 answer
  • 1.a computer can create an output based on the input of the user.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!