1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GalinKa [24]
3 years ago
7

Here is a nested loop example that graphically depicts an integer's magnitude by using asterisks, creating what is commonly call

ed a histogram: Run the program below and observe the output. Modify the program to print one asterisk per 5 units. So if the user enters 40, print 8 asterisks.num = 0while num >= 0: num = int(input('Enter an integer (negative to quit):\n')) if num >= 0: print('Depicted graphically:') for i in range(num): print('*', end=' ') print('\n')print('Goodbye.')
Computers and Technology
1 answer:
bogdanovich [222]3 years ago
7 0

Answer:

Please find the code in the attached file.

Output:

Please find the attached file.

Explanation:

In this code a "num" variable is declared that use while loop that check num value greater than equal to 0.

Inside the loop we input the "num" value from the user-end and use if the value is positive it will define a for loop that calculates the quotient value as integer part, and use the asterisks to print the value.

If input value is negative it print a message that is "Goodbye".

Please find the code link:   https://onlinegdb.com/7MN5dYPch2

You might be interested in
A manager wants to set up an area that is not on the LAN but not quite on the Internet. This area will house servers that will s
andreev551 [17]

Answer:

1. DMZ  (Demilitarized zone)

Explanation:

In computer networking, a Demilitarized Zone is a physical or logical network designed to give an extra layer of security on the organization’s private network. The DMZ acts as an interface between an untrusted network such as the internet and the organization’s internal network. When a server is set up in a demilitarized zone, users can reach it via its public IP address. In case there is an attack on the server, the private network is still protected.

3 0
3 years ago
Bran is writing a book on operation system errors. Help him complete the sentences.
MrMuchimi

Answer:

The answer to this question is given below in the explanation section.

Explanation:

A  <u>          </u><u>logic   </u><u>         </u>error occurs when a program runs accurately, but yields the wrong result. Therefore, it is difficult to detect. However, a program can detect <u>       </u><u>syntax  </u><u>                  </u>errors rapidly, because they occur in the structure of programming code during the compilation stage.

8 0
3 years ago
Please Help!<br><br>in return brainliest and special thanks
arlik [135]
1. Option 3
2. Option 2
3. Option 3
8 0
3 years ago
1.Write the Qbasic program to find sum of any 10 different numbers.
dybincka [34]

Answer:

1.

DIM myArray(10) as INTEGER

LET A = 0

FOR I = 1 TO 10 STEP 2

INPUT “INPUT NUMBER”; myArray(i)

LET A = A + myArray(i)

NEXT  

PRINT A

END

2.

REM PROGRAM FOR CALCULATING THE SIMPLE INTEREST

CLS

INPUT “INPUT THE PRINCIPAL”; P

INPUT “INPUT THE TIME”; T

INPUT “INPUT THE RATE”;R

SI = P* T * R / 100

PRINT “SIMPLE INTEREST =”; SI

END

Explanation:

Please find the respective programs in the answer section.

4 0
3 years ago
Which tool in Access will give you a detailed report showing the most accurate and complete picture of
Angelina_Jolie [31]

The Query tool is the tool in MS access that will give user detailed report showing the most accurate and complete picture of employee attendance grouped by day

<h3>What is the Query tool?</h3>

The Query tool helps to give answer to a simple question, perform calculations, combine data from a database

In conclusion, the Query tool is the tool in MS access that will give user detailed report showing the most accurate and complete picture of employee attendance grouped by day

Read more about Query tool

<em>brainly.com/question/5305223</em>

4 0
3 years ago
Other questions:
  • ?the single most effective security measure for digital devices is to password protect access to them.
    5·1 answer
  • You have received several trouble tickets from the employees in the warehouse for the stand-alone computers used to control vari
    14·1 answer
  • Match the part of motherboard to its function
    15·1 answer
  • What is the decimal equivalent of the binary number 1102?
    8·2 answers
  • An installed theme can be applied by clicking on a theme in the themes group on the ____ tab.
    7·2 answers
  • What feature of a word processing program helps you to easily check and correct spelling mistakes?
    9·1 answer
  • What was the technology that defined each of the four generations of computers?
    12·1 answer
  • Write an expression using membership operators that prints "Special number" if special_num is one of the special numbers stored
    12·1 answer
  • What is the definition of a digital signal?
    14·1 answer
  • Who plays oblox .............................
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!