1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sweet-ann [11.9K]
3 years ago
9

Python exercise grade 10

Computers and Technology
1 answer:
Marysya12 [62]3 years ago
3 0

while True:

   num = int(input("Enter a number: "))

   if num == 0:

       break

   first = num // 100

   second = (num // 10) - (first * 10)

   third = (num - (first * 100)) - (second * 10)

   reversed_digit = (third * 100) + (second * 10) + first

   if 9 < num < 100:

       reversed_digit = reversed_digit // 10

   elif num < 10:

       reversed_digit = reversed_digit//100

   print("The reversed digit is:",reversed_digit)

I wrote my code in python 3.8. I hope this helps.

You might be interested in
What can you find the under the privacy policy section of a shopping website?
masya89 [10]

The privacy policy will tell you what the site will do with your information.

7 0
3 years ago
To increase security on your company's internal network, the administrator has disabled as many ports as possible. Now, however,
tia_tia [17]

Answer: 443

Explanation:

Port 443 will need to be enabled for secure transactions to go through because it is the default port for HTTPS which is the transfer protocol for secure communication.

This way your credit card transactions will be encrypted to ensure protection from those who would seek to steal your data and your money.  

8 0
3 years ago
Ternary operators of computer<br><br>please explain. ​
Nitella [24]

Answer:

It's a compact way of doing an if-else statement.

General Format is

<<em>condition</em>> ? <if condition is true> : <else>;

Example:

I could rewrite:

  if(a==1) temp = 1;

  else     temp = 999;

as

  temp = (a==1) ? 1 : 999;

5 0
3 years ago
When a cryptogrpahic system is used to protect data confientiality what takes place?
Alex73 [517]

Answer:

Unauthorized users are prevented from viewing or accessing the resource

5 0
2 years ago
What are two potential benefits of using calendar-synchronization tools like calendly
Tamiku [17]
The answer is B, sorry if I’m wrong
4 0
3 years ago
Other questions:
  • What important technology has done the most to allow small businesses a change to compete with larger international companies.
    6·1 answer
  • What is the purpose of the print area feature​
    11·1 answer
  • Mila received a new DVD player that she is trying to connect to the back of her television by feel alone. The first stage of mem
    11·1 answer
  • Can someone please help me on these short short questions marking Brainly computer modeling people please help
    14·1 answer
  • What does aperture control? A)amount of light the image sensor captures when taking a photo. B)how sensitive the camera is to in
    10·2 answers
  • PLS HURRY!!<br> Look at the image below!
    7·1 answer
  • The measure means to determine the exact size, amount, or distance of something
    11·1 answer
  • I need help 50 points and brainiest if you answer
    10·2 answers
  • QUESTION 8
    13·1 answer
  • A type of user interface that features on- screen objects, such a menus and icons, manipulated by a mouse.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!