1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
igomit [66]
3 years ago
7

It needs to be as simple as possible. Each question is slightly different.1. An arithmetic progression is a sequence of numbers

in which the distance (or difference) between any two successive numbers is the same. This in the sequence 1, 3, 5, 7, ..., the distance is 2 while in the sequence 6, 12, 18, 24, ..., the distance is 6.Given the positive integer distance and the non-negative integer n, create a list consisting of the arithmetic progression between (and including) 1 and n with a distance of distance. For example, if distance is 2 and n is 8, the list would be [1, 3, 5, 7].Associate the list with the variable arith_prog.
Computers and Technology
1 answer:
madam [21]3 years ago
4 0

Answer

can we get a picture of the problem ?

Explanation:

You might be interested in
Which of the following were input devices for early portable computers?
nordsb [41]

Answer:

Notebooks

Explanation:

The answer is Notebooks

5 0
3 years ago
Which type of vulnerability scan mimics the work of a threat actor who has already exploited a vulnerability and compromised cre
Vilka [71]

There are different type of vulnerability scan. The type of vulnerability scan mimics the work of a threat actor is called Credential Vulnerability Scan.

Credential Vulnerability Scan is known to be a scan in which there is a valid authentication of credentials Example are usernames and passwords etc. are known to be supplied to the vulnerability scanner to mimic the work of a threat actor that has these credentials.

They are known to be very slow but can give an in-depth insight into the system by accessing a wide range of the installed software  

Learn more from

brainly.com/question/14728460

5 0
3 years ago
What are 2 ways to access the vendor credit screen in quickbooks online?
kiruha [24]

Answer:

First by

Clicking

New Button (+) THEN click Vendor THEN click Credit

Secondly

Click Expenses Center then click New Transaction then finally click Vendor Credit

4 0
3 years ago
If you want to change your system settings, what should you use
Vedmedyk [2.9K]

Answer:

you click on your profile, and you should see settings

Explanation:

4 0
3 years ago
What happens when two computers use the same IP address?
OLga [1]

Two computers can safely have the same IP address in certain cases. In most cases, if those two computers are on the same local network, it breaks connectivity for one or both of them. Internet protocols work by sending small, individually addressed messages. Each message can be routed differently.

I hope this helps you.

6 0
3 years ago
Other questions:
  • To indent the first line of a paragraph which key should you use
    13·2 answers
  • If a student is looking for the degree symbol (°) and it is not found on the main drop-down of symbols, what should the student
    9·2 answers
  • Who Can Infiltrate And Use Email Notifications To Camouflage Malicious Links ?
    13·1 answer
  • 2. Use the Internet to research Robocopy switches and then construct a command line that will use Robocopy to copy files in rest
    14·1 answer
  • Which of these statements about symmetric key encryption is true? The file is encrypted with a private key and can be decrypted
    14·1 answer
  • HELP!! TIMED TEST!! Match the item to its description. 1. icons place where frequently used programs can be opened 2. Quick Laun
    13·1 answer
  • LensForAll is a company that sells affordable contact lenses on its website. The CEO of the company realizes that an app must be
    9·1 answer
  • Tipos de estructuras A. Expresiones y de variables B. Selectivas y de control C. Instrucciones y parámetros
    5·1 answer
  • 50 POINTS
    6·1 answer
  • When you type in text in an image in a photo-editing software, where is it created?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!