1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
11Alexandr11 [23.1K]
3 years ago
3

Create a script that contains the array [34, 9, 32, 91, 58, 13, 77, 21, 56]. The script will take a user input count that define

s the number of elements to fetch from an array and then outputs those elements.
Computers and Technology
1 answer:
weeeeeb [17]3 years ago
5 0

Answer:

The program in Python is as follows:

myList = [34, 9, 32, 91, 58, 13, 77, 21, 56]

n = int(input("Elements to fetch: "))

for i in range(n):

   print(myList[i],end = " ")

Explanation:

This is the compulsory first line of the program

myList = [34, 9, 32, 91, 58, 13, 77, 21, 56]

This gets the number of elements to fetch from the list

n = int(input("Elements to fetch: "))

The iterates through the number

for i in range(n):

This prints from the first to n index

   print(myList[i],end = " ")

You might be interested in
What is the biggest problem with technology today?
Mariulka [41]

Answer:

Employee productivity measurements and too mich focus on automation.

5 0
3 years ago
5. How is shutter speed generally measured? What do the measurements mean?
Leokris [45]
Shutter speed<span> is </span>generally measured<span> by the scientific symbol “s”. The </span>measurement means<span> that the </span>measurements<span> in "s" is the reciprocal of the number when the denominator is put on the numerator side instead. ... Aperture is </span>measured<span> by f's.</span>
6 0
3 years ago
Read 2 more answers
A threat analyst is asked about malicious code indicators. Which indicator allows the threat actor's backdoor to restart if the
joja [24]

Indicators of compromise enable system administrators and information security professionals to detect intrusion attempts or malicious activities.

Your information is incomplete as the options aren't provided. Therefore, an overview of indicators of compromise will be given.

Indicators of compromise means the pieces of forensic data that are found in files or system log entries to identify malicious activity on a network or system.

Indicators of compromise help IT and information security professionals to detect malware infections, data breaches, etc. Examples of indicators of <em>compromise</em> include log-in red flags, unusual outbound network traffic.

Read related link on:

brainly.com/question/25522987

8 0
3 years ago
Explain the limitations of the old economy<br>​
pickupchik [31]

Explanation:

Time Constraint and Time Consuming: Nobody would carry out business when the market was closed. ... Limited Space: The old economy depended on physical space such as market places and offices before business transaction could take place.

7 0
3 years ago
1. The precious metals needed to make computer chips, graphic cards, and transistors are found in only a small population of cou
dexar [7]

Answer:

it means that they can charge companies to come mine it making them more wealthy they can also upscale the materials needed to make it as they are the only countries that sell it so they have no one to compete with

3 0
3 years ago
Other questions:
  • Ruth knows the name of a presentation file and the folder it's in, but there are many files in that folder. How can Ruth quickly
    8·1 answer
  • Life can get busy and hectic but relationships matter what is an effective way to mending relationships that may have been negle
    9·1 answer
  • 14. Which now-established technology went through the “emerging” phase in the early 2000s and makes the sharing of ideas much ea
    7·1 answer
  • A _______ object is used for storing data.
    9·2 answers
  • What are the steps to creating a blank database? Use the drop-down menus to complete them.
    9·1 answer
  • What is the purpose of a report?
    6·2 answers
  • Sarah is a detall-oriented programmer. While testing her program, what other skill would she have to apply in order to detect al
    9·1 answer
  • Read two numbers from user input. Then, print the sum of those numbers.
    11·1 answer
  • The internet is based on which three key technologies?.
    9·1 answer
  • Service provided by multiple servers acting in parallel is referred to as: a. Multiple-phase queuing system b. Multiple-channel
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!