1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lawyer [7]
3 years ago
11

Assignment 4: Evens and Odds

Computers and Technology
1 answer:
Anika [276]3 years ago
5 0

n = int(input("How many numbers do you need to check? "))

odd = 0

even = 0

i = 0

while i < n:

   num = int(input("Enter number: "))

   if num % 2 == 0:

       even += 1

       print(str(num)+" is an even number")

   else:

       odd += 1

       print(str(num)+" is an odd number")

   i += 1

print("You entered "+str(even)+" even number(s).")

print("You entered "+str(odd)+" odd number(s).")

I hope this helps!

You might be interested in
I need to know everything about lg fortune network unlocking or sim network unlock pin. Where, How, Which is best solution to do
vodka [1.7K]

Answer:

Lg fortune network unlocking is a method through which lg fortune can be used with any network or provider

Explanation:

When Any Network (e.g At&t, Cricket etc.) launched any smart phone (e.g lg fortune) they barricade their devices with a unique code, This blockade can be removed through sim network unlock pin. The only way to get it, is the phone`s imei which is also unique of each and every phone/tablet.

When you order it by sending the imei to a legitimate source like 24x7unlockcodes.com, They process it & derived a 100% working Lg Fortune unlock code. It safely unlock your Cricket Devices in skillful manners without damaging it. You can also get it from any cell phone shop.

7 0
3 years ago
Which mitigation technique would prevent rogue servers from providing false ip configuration parameters to clients?
IrinaVladis [17]
DHCP snooping is a mitigation technique<span> to </span>prevent rogue<span> DHCP </span>servers  <span>from </span>providing false IP configuration parameters to clients.  DHCP snooping<span> is a security feature that acts like a firewall between untrusted hosts and trusted </span>DHCP<span> servers. It is</span><span> a series of techniques applied to improve the security of a </span>DHCP<span> infrastructure. </span>
6 0
3 years ago
Read 2 more answers
Which of these is an example of subliminal advertising
solniwko [45]

Answer:

D. a claim that more people drink a certain brand of cola that others

Explanation:

Basta yan yung sagot ko

7 0
3 years ago
Read 2 more answers
Before using your Twitter account to market your personal brand, you should evaluate Your profile picture Your bio Your tweets A
AnnZ [28]
D. All of the Above.

If you are using a Twitter account for marketing your personal brand, you certainly should evaluate your entire profile, which includes your pictures, bio and tweets.  
5 0
3 years ago
Which table cannot have a trigger associated with it in mysql
timofeeve [1]

Answer:

MySQL triggers cannot:<u> Use SHOW , LOAD DATA , LOAD TABLE , BACKUP</u> DATABASE, RESTORE , FLUSH and RETURN statements. Use statements that commit or rollback implicitly or explicitly such as COMMIT , ROLLBACK , START TRANSACTION , LOCK/UNLOCK TABLES , ALTER , CREATE , DROP , RENAME.

Explanation:

hope it helps

mark me brainliest pls

3 0
2 years ago
Other questions:
  • If I want to have an estimate of the number of people who visited my website, which metric should I use?
    5·2 answers
  • You can include up to _____ logical conditions in the and function.
    12·1 answer
  • List the step in turning on a computer
    6·1 answer
  • What important feature of an email gives you a clue about what the sender wants to tell you?
    12·2 answers
  • A computer's hard disk drive holds 8 x 10^10 bytes of information. If Jill buys an extra memory stick that holds 5.1 X 10^8 byte
    10·1 answer
  • Suppose a process in Host C has a UDP socket with port number 6789. Suppose both Host A and Host B each send a UDP segment to Ho
    8·1 answer
  • A large amount of scatter in a scatterplot is a indication that the association between the two variables is
    13·2 answers
  • What is the ghosted text or picture behind the content on the page?​
    6·1 answer
  • Which item is essential to know before sketching a navigation menu flowchart?
    7·2 answers
  • 1.Microsoft Word is a/an ........​
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!