1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blondinia [14]
3 years ago
15

NumA=2 for count range (5,8) numA=numA+count print(numA)

Computers and Technology
1 answer:
love history [14]3 years ago
7 0

Answer:

for count in range (5,8): numA=numA+count print(numA)

Explanation:

You might be interested in
The function below takes one parameter: a string (date_string) containing a date in the mm/dd/year format. Complete the function
Natalija [7]

Answer:

The solution code is written in Python 3.

  1. def convertDate(date_string):
  2.    date_list = date_string.split("/")
  3.    for i in range(0, len(date_list)):
  4.        date_list[i] = int(date_list[i])
  5.    return date_list  
  6. print(convertDate('06/11/1930'))

Explanation:

Firstly, create a function convertDate() with one parameter, <em>date_string</em>. (Line 1).

Next, use the Python string <em>split()</em> method to split the date string into a list of date components (month, day & year) and assign it to variable <em>date_list</em>. (Line 3) In this case, we use "/" as the separator.

However, all the separated date components in the <em>date_list</em> are still a string. We can use for-loop to traverse through each of the element within the list and convert each of them to integer using Python<em> int() </em>function. (Line 5 - 6)

At last return the final date_list as the output (Line 8)

We can test our function as in Line 11. We shall see the output is as follow:

[6, 11, 1930]

8 0
3 years ago
What is the Piston Displacement having 3-inch bore and 3-inch stroke?
n200080 [17]

Answer:

<h3>Displacement = 0.7854 x bore² x stroke x # of cylinders.</h3><h3 /><h3>.7854 x 3² x 3 x 4 = 84.82 cubic inches</h3>

Explanation:

<h2><em><u>PLEASE</u></em><em><u> </u></em><em><u>MARK</u></em><em><u> ME</u></em><em><u> BRAINLIEST</u></em><em><u> AND</u></em><em><u> FOLLOW</u></em><em><u> ME</u></em><em><u> LOTS</u></em><em><u> OF</u></em><em><u> LOVE</u></em><em><u> FROM</u></em><em><u> MY</u></em><em><u> HEART'AND</u></em><em><u> SOUL</u></em><em><u> DARLING</u></em><em><u> </u></em><em><u>TEJASWINI</u></em><em><u> SINHA</u></em><em><u> HERE</u></em><em><u> </u></em><em><u>❤️</u></em></h2>
3 0
3 years ago
_______________ is used by a hacker to mask intrusion and obtain administrator permissions to a computer.
Sergeu [11.5K]

Answer:

Rootkit.

Explanation:

Rootkit is a collection of software tools,mostly malicious.These are mostly used by hackers to obtain administrator permission to a computer by masking intrusion.

Root-kit is made from two word Root and kit.Where root refers to the name of privileged account on an operating system that is somewhat like unix and KIT refers to the tools used.

6 0
4 years ago
Which shape denotes a process to be carried out in a flowchart?
luda_lava [24]

The answer is a rectangle.

6 0
3 years ago
Read 2 more answers
How many host ids does a /20 network support?
BlackZzzverrR [31]
2^(32-20) - one for the network number - one for the broadcast address = 4,094
5 0
4 years ago
Other questions:
  • _____ is a method of delivering software, in which a vendor hosts the applications, and customers access these applications over
    10·1 answer
  • How useful is the creation of folders for your computer
    9·1 answer
  • It's time for you to schedule a dental checkup. The responsible thing to do is to ___
    11·1 answer
  • A _____________ is a method of controlled entry into a facility and provides access to secure areas such as a research lab or da
    10·1 answer
  • Which different supports from a part of the matte box?
    8·1 answer
  • Sally needs to copy data from the first worksheet to the fifth worksheet in her workbook. Which combination of keys will she use
    6·2 answers
  • All of the following are examples of service learning opportunities exept
    11·1 answer
  • Why bootable installer preparation is important? explain
    9·1 answer
  • What feature should be used before a document is printed
    8·1 answer
  • It is possible to create a share that is invisible to users browsing the network simply by appending what character to the end o
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!