1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
posledela
2 years ago
14

WILL GIVE BRAINLIEST!! 20 PNTS!!!

Computers and Technology
2 answers:
Anettt [7]2 years ago
8 0

Answer:

C 1,2,3,4

Explanation:

This means I want to count from 0-4 and set it o the current loop I am currently on.

for i in range(0, 5):

 print("i currently equals: ", i)

The result will be

i currently equals: 0

i currently equals: 1

i currently equals: 2

i currently equals: 3

i currently equals: 4

Novosadov [1.4K]2 years ago
3 0

Answer:

c. 1 2 3 4

Explanation:

i got it right on edge

You might be interested in
3
sergiy2304 [10]

Answer: I believe this would be A.) choosing an alternative

Explanation:

6 0
2 years ago
Read 2 more answers
How many fonts are there in a theme?<br> A. 1<br> B. 2<br> C. 4<br> D. 5
BlackZzzverrR [31]

B. 2

If incorrect, sorry

6 0
2 years ago
What's your fav show?
mezya [45]

Answer:

<h3>ITS DEPENDS IF I'M INTERESTED</h3>

Explanation:

HBU?^_________^

6 0
2 years ago
Read 2 more answers
6. Which of the following is malware? (1 point)
lubasha [3.4K]
Software to damage computers
5 0
2 years ago
Read 2 more answers
Which of the following protocols support the encryption and decryption of e-mail messages?
Katena32 [7]
It seems that you have missed the necessary options for us to answer this question so I had to look for it. Anyway, here is the answer. The protocol that supports the encryption and decryption of e-mail messages is this: <span>Secure Multipurpose Internet Mail Extensions (S/MIME) and Pretty Good Privacy (PGP). Hope this helps.</span>
7 0
3 years ago
Other questions:
  • Show the subnet address, subnet mask in slash notation, broadcast address, number of addresses, first valid host address, and th
    13·1 answer
  • Before using large downloaded files that are in a compressed format, it is necessary to_____ them. A) Copy B) Extract C) Open D)
    9·1 answer
  • A program that doesn’t work properly needs to be debugged. true or false
    8·1 answer
  • Pick the correct characteristics that define the porous inkjet paper.
    6·1 answer
  • Why do you think Jacinda believed what people told her about her own beauty? Even if you understand that what you see on social
    13·1 answer
  • Compare and contrast two fundamental security design principles in network security. Analyze how these principles and how they i
    15·1 answer
  • write code to print out all combinations of pairs of numbers 1 through m and 1 through n, separated by a comma
    10·1 answer
  • What option can be used by a system administrator to ensure that dynamic updates are made only by known clients when you have a
    8·1 answer
  • The second generation of computer languages is a higher-level language than
    14·1 answer
  • 4. The volume of a sphere is (4.0/3.0)rr3 and the surface area is 4.0rr2, where r is the radius of
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!