1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
uysha [10]
2 years ago
15

Write a program that fills a list with 100 random numbers between 0 and 200, inclusive. Traverse through the list and only print

out the numbers that are less than 99. You can develop this code in App Lab if you like and copy your final program to the answer area below. Keep the code neat and use curly braces where necessary. This question is worth 4 points. *
Computers and Technology
1 answer:
svet-max [94.6K]2 years ago
7 0

Answer:

Follows are the code to this question:

import random as ra#import package  

r=[ra.randint(0, 200) for x in range(100)]#defining a variable r that use rand method to add value in list  

j= [i for i in r if i < 99]#defining j variable that checks list value is less than 99

print (j)#print list value

Output:

[20, 23, 66, 47, 89, 7, 18, 13, 92, 31, 23, 60, 3, 52, 18, 20, 85, 64, 55, 98, 14, 80, 80, 14, 57, 92, 76, 14, 91, 83, 87, 80, 16, 50, 7, 88, 19, 4, 72, 23, 27, 79, 23]

Explanation:

In this code, package random is imported, in the next step, the r variable is declared, that uses the randit method, and use for loop that adds value in the list. In the next step, the j variable is declared, which uses a for loop and a conditional statement to check its value is less than 99, add print its value.

You might be interested in
You have a folder on your Windows desktop system that you would like to share with members of your development team. Users need
horrorfan [7]

Answer:

modify the NTFS permissions on the folder

Explanation:

In order to solve this problem what you need to do is to modify the NTFS permissions on the folder. The NT File System permissions are security measures blocking access to manipulation of files within a directory and affects local users as well as network users. By adjusting the permissions of this within the folder that the members are trying to access then it will give them the ability to modify the files.

5 0
3 years ago
What ribbon command on the home tab can you use to change a cell fill color automatically
vlada-n [284]

Conditional Formatting is the ribbon command on the home tab that one can use to change a cell fill color automatically based on the value of the cell.

The Conditional Formatting on the home tab are used to change the cells fill color based on the value of the cell.

Hence, the conditional Formatting is the ribbon command on the home tab that one can use to change a cell fill color automatically based on the value of the cell.

Read more about conditional Formatting

<em>brainly.com/question/25051360</em>

6 0
2 years ago
Read 2 more answers
Enterprise storage systems typically use fast Fibre Channel or ____ connections and are scalable so more hard drives can be adde
Readme [11.4K]

Enterprise storage systems typically use fast Fibre Channel or iSCSI connections and are scalable.

<h3>What is iSCSI known for?</h3>

ISCSI is a word that connote Internet Small Computer System Interface, and it functions as or on top of the Transport Control Protocol (TCP) and it gives room for the SCSI command to be transmitted to the end-to-end over local-area networks (LANs), and others.

Note that Enterprise storage systems typically use fast Fibre Channel or iSCSI connections and are scalable.

Learn more about storage systems from

brainly.com/question/24179644

#SPJ1

7 0
1 year ago
What is a primary risk to the Workstation Domain, the Local Area Network (LAN) Domain, and the System/Application Domain
eimsori [14]

It should be noted that a primary risk to the Workstation Domain is the absence of a firewall and unauthorized access to the workstation.

<h3>What is a workstation domain?</h3>

The Workstation Domain simply means an individual user's computer where his or her work takes place. It should be noted that computers operating systems have vulnerability which can be susceptible to hackers.

A primary risk to the Workstation Domain is the absence of a firewall and unauthorized access to the workstation.

Learn more about workstation on:

brainly.com/question/26097779

8 0
2 years ago
Critical Thinking Questions
nydimaria [60]
You’re profile is so cute hope this helps :)
5 0
2 years ago
Other questions:
  • The checksum doesn't compute for a packet sent at the Internet Protocol (IP) level. What will happen to the data?
    14·1 answer
  • Matt wants to build an app that will reach many people all over the world. However, he worries about having to modify apps for a
    14·1 answer
  • The instruction set for a microprocessor is unique and is typically understood only by the microprocessors of the same brand.
    7·1 answer
  • As a load is mechanically lifted, the materials ____________________.
    7·1 answer
  • Which of the following activities poses the greatest personal cybersecurity risk? A. Making a purchase on an online store that u
    13·1 answer
  • The pay of an hourly worker is calculated by multiplying the hours worked by the hourly rate—up to 40 hours; any hours worked be
    11·1 answer
  • What is the purpose of a career portfolio?
    6·1 answer
  • How to use access?<br> like working in access and bringing tables and stuff
    5·1 answer
  • We will create a shopping cart, it is a dictionary mapping items in the car to the amount of that item. For example if there is
    9·1 answer
  • Impromptu speaking ability is very important in the workplace to clearly and effectively communicate ideas. An effective impromp
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!