1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
astraxan [27]
3 years ago
13

Write a function that takes two arguments, both integers, and prints the product. In the main part of your program (the part tha

t isn’t inside a function), call your function to test it out.
Computers and Technology
1 answer:
Fudgin [204]3 years ago
5 0

Answer:

def multiply(a, b):

print(a*b)

multiply(2,3)

Explanation:

Using python3 :

The program is written using python 3 ;

def represent the statement used at the start of a function.

Multiply is the name given to our function (it could be any other name of interest)

(a, b) are the argument, which represents the two integers the function takes.

print(a * b) = What the function does is to print the product of a and b

multiply(2,3) is used to test out our function by call the name and Giving  it two integers to work on. The function will print 6

You might be interested in
The address space 0x0000-0x3FF is assigned to I/O peripherals of a given HCS12 chip. How many K bytes is this? (Points : 2) 2K
UNO [17]

Answer:

D. 1K

Explanation:

The address space 0x0000-0x3FF is of 1KB(One Kilo Byte) since 0x3ff is equal to 1023. therefore 1023=1 KB.

bitwise 0x3ff zeros out the top bits of the number such that the result is always between 0 and 1023. It is essentially the same thing as modulo( num,1024) for positive  values of num.

Hence the answer is D 1K

3 0
3 years ago
GUIs provide all of the following except _____.. a.command prompts. b.desktops. c.icons. d.menus
Sloan [31]
The answer should be none of the above
Take windows 10 for example
It has cmd and desktop and icons and menus

3 0
3 years ago
Read 2 more answers
Differentiate between symmetric and asymmetric encryption
Shalnov [3]

Answer:

While symmetric encryption uses a single shared key to encrypt and decrypt data, asymmetric uses two separate keys

8 0
2 years ago
Read 2 more answers
Complete the sentence.
julsineya [31]

Answer:

An internal server error

5 0
3 years ago
A security risk to email is​ __________, which are fraudulent messages that prompt unwary users to reveal sensitive information
d1i1m1o1n [39]

Answer:

Option C is the correct answer for the above question.

Explanation:

Pishing is a type of attack which is used by the attacker to access the secured information from the system. It is used by the third person assuming for the system that he is the right use of the system and can access the information of the system.

The above question asked about the attack which can access the information to assume that he is the right user and give accessed to the network to been hacked. So the answer is phishing which is described above. Hence option C is the correct while the other is not because:-

  • Option A states about direct mail which is not a type of attack.
  • Option B states about instant messaging which is also not a type of attack.
  • Option D states about spam which is used to send the spam messages.
  • Option 'E' states about the mass mail which is used to send the lots of spam mail.
5 0
3 years ago
Other questions:
  • Algorithm for converting decimal into binary.
    7·1 answer
  • Why isn't there a Psychology section on this app?
    5·1 answer
  • Consider the problem of finding the distance between the two closest numbers in an array of n numbers. (The distance between two
    13·1 answer
  • On the Excel Ribbon, click the Data tab in the Sort & Filter Group, and then click the Sort button to conduct a _____ sort.
    8·1 answer
  • Why did the creation of ARPANET help with this critical need?
    9·1 answer
  • Refer to the exhibit. The web servers WS_1 and WS_2 need to be accessed by external and internal users. For security reasons, th
    12·1 answer
  • What is the term meaning a Java object that has attributes and methods?
    12·1 answer
  • Which of these is not part of the art director's job?
    9·2 answers
  • You are between flights at the airport and you want to check your email. Your wireless settings show two options:
    14·1 answer
  • Please tell fast plzzzzzzzzzzz.​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!