1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
uysha [10]
3 years ago
15

Write a program that fills a list with 100 random numbers between 0 and 200, inclusive. Traverse through the list and only print

out the numbers that are less than 99. You can develop this code in App Lab if you like and copy your final program to the answer area below. Keep the code neat and use curly braces where necessary. This question is worth 4 points. *
Computers and Technology
1 answer:
svet-max [94.6K]3 years ago
7 0

Answer:

Follows are the code to this question:

import random as ra#import package  

r=[ra.randint(0, 200) for x in range(100)]#defining a variable r that use rand method to add value in list  

j= [i for i in r if i < 99]#defining j variable that checks list value is less than 99

print (j)#print list value

Output:

[20, 23, 66, 47, 89, 7, 18, 13, 92, 31, 23, 60, 3, 52, 18, 20, 85, 64, 55, 98, 14, 80, 80, 14, 57, 92, 76, 14, 91, 83, 87, 80, 16, 50, 7, 88, 19, 4, 72, 23, 27, 79, 23]

Explanation:

In this code, package random is imported, in the next step, the r variable is declared, that uses the randit method, and use for loop that adds value in the list. In the next step, the j variable is declared, which uses a for loop and a conditional statement to check its value is less than 99, add print its value.

You might be interested in
Wireless internet is an example of telecommunications.
lawyer [7]
Anything is telecommunication if it has a <span>transmitter</span> and receiver. If you're a Host, then you're hosting (Transmitting) a connection. If you have a router as a customer or service, then you're receiving their signal (transmitting). You're the receiver. 
7 0
3 years ago
What should you do first when designing a program?
Nady [450]

Answer: talk about da progrm

Explanation:

6 0
3 years ago
Read 2 more answers
1. Power tools are tools that use:
34kurt
Power tools use electricity to run. They need some type of battery or cord to do their job.
6 0
3 years ago
Read 2 more answers
Samuel received an email that looked like it came from his bank. The email told him to click a link that opened an official look
GalinKa [24]

Answer:

The answer is "Option b".

Explanation:

Phishing is used by hackers to get sensitive data. It is a software tool, that offers online mail to use we can track the users. It also known as a state, in  which clients will have to re-enter id and pass codes to validate themselves due to some changes to the system, and incorrect option can be defined as follows:

  • In option a, It is used to attack on user system.
  • In option c, It is used to provides unauthorized access.
  • In option d, It is also known as malware, which is installed in user smartphones.

8 0
3 years ago
ABC Corporation has decided to deploy their first Wi-Fi network in their corporate headquarters. ABC prepared for adding a Wi-Fi
inn [45]

Answer:

The answer is PoE+.

Explanation:

PoE (Power Of Ethernet) is a method that is widely used everywhere where there is an internet connection needed because of its ability of being able to deliver both power and the internet connection from the same line. The different PoE types are selected according to the amount of voltage that is needed to be delivered.

In the example given in the question, ABC is adding a Wi-Fi network through PoE Ethernet Switches in "wiring closets" which is where the power is added to the line. The type of PoE implementation used is PoE+ which provides higher power because it is going through the wiring closets.

I hope this answer helps.

6 0
3 years ago
Other questions:
  • Which of the following is true of an enterprise search software? Select one:
    5·1 answer
  • 1. According to Rory's paycheck, he earned $800 last month, but before taxes and other deductions were
    12·1 answer
  • A___________is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its
    11·1 answer
  • In a @return tag statement the description:
    13·2 answers
  • Si la velocidad del sonido en el aire es de 330m/s , calcula la longitud De onda en metros, de una nota musical de frecuencia 55
    5·1 answer
  • A PenTester has successfully exploited a remote host on a clients’ network. They want to create a backdoor on the host for futur
    11·1 answer
  • Authentication is a mechanism whereby unverified entities or supplicants who seek access to a resource provide a label by which
    12·1 answer
  • Ill give alot of points if you answer: How do I get a 100 dollar ps4
    5·2 answers
  • Create a function called sphereVolume that determines the volume of a sphere with a given radius and prints the result to the sc
    9·1 answer
  • Pls help me, it's due today​
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!