1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brrunno [24]
3 years ago
9

If a= ‘ Stay home, Stay safe’ , print its value

Computers and Technology
1 answer:
Damm [24]3 years ago
7 0

Answer:

Since the language isn’t stated, I’ll give answers in the two most-used (?) languages: Java and Python.

a) To print a’s value 3 times in the same line, in Java we would do:

System.out.print(a+a+a);

In Python, we would write:

print(a*3)

b) 2 times in different lines using one print statement

In Java, we would write

System.out.println(a+”\n”+a+”\n”+a);

In Python we would write:

print(a,a,a,sep=’/n’)

Hope this helps!

You might be interested in
Match each scenario to the absolute value expression that describes it. 1. the distance moved when going backwards five spaces i
soldi70 [24.7K]

Answer:

i don tunderstand the question

Explanation:

4 0
3 years ago
Read 2 more answers
In information systems, _____ is information from a system that is used to make changes to input or processing activities.
Tom [10]

Answer:

"Feedback" is the correct answer for the above question.

Explanation:

  • Feedback is used in any information system or any communication system to tells that any process is doing in the right direction.
  • It is used in communication channels to tell the sender that the message is received by the receiver.
  • It is a type of message which is sent by the user to the system that he gets the correct or wrong output by that system.
  • The above question asked about the term which is used in the information system which suggests changing the processing activity. This is known as feedback which is described above.
6 0
4 years ago
BRIANLIEST!!!!!!!!!!!!!!!!
oksano4ka [1.4K]

Answer:

First Line indent

Explanation:

should be correct

4 0
3 years ago
Read 2 more answers
Draw a project network from the following information. What activity(ies) is a burst activity? What activity(ies) is a merge act
Effectus [21]

The answer & explanation for this question is given in the attachment below.

5 0
3 years ago
You just received a message from the internet which was encrypted with asymmetric encryption. what do you need to do to read the
Bezzdna [24]
Assuming the data was encrypted with YOUR public key, you'll need YOUR private key to decrypt it. That's answer e.

a and b are not solutions by themselves, of course you need to use the decryption algorithm, but a key goes with it.

c would be about symmetric encryption, but this is asymmetric, so different keys are used for encryption and decryption

d is possible, but it would mean anyone can decrypt it (after all the key is public), so then there's no point in encrypting it in the first place.

So e is the only logical answer.
5 0
3 years ago
Other questions:
  • How do you uninstall a program using the Control Panel?
    10·1 answer
  • A virus has attacked your hard drive and now when you start up Windows, instead of seeing a Windows desktop, the system freezes
    9·2 answers
  • Which categories format cells
    14·2 answers
  • How does a linear algorithm perform compared to a quadratic one on our imaginary race track?
    5·1 answer
  • You are given an integer N, followed by N lines of input (1 <= N <= 100). Each line of input contains one or several words
    8·1 answer
  • A local cinema allows customer to make a movie ticket reservation. A customer can be
    6·1 answer
  • What does a computer need from people in order to solve problems effectively?
    9·1 answer
  • Science Help
    11·1 answer
  • Which model represents any process in general?
    6·1 answer
  • In what way, if any, is the impact of a given risk affected by the timing of a project?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!