1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stells [14]
3 years ago
14

What is the output of the following program? for num in range(4): print (num * 2)

Computers and Technology
1 answer:
kolezko [41]3 years ago
6 0

The range() function with one parameter defaults to a starting value of 0 and has an ending value of the number specified exclusive.

range(4) is all the integers between 0 and 4 not including 4.

for num in range(4):

   print(num*2)

The output would be 0 2 4 6 all on separate lines.

You might be interested in
The term ____ means that a public information network such as an Internet service provider (ISP) should treat all users, all pla
Softa [21]

Answer:

Domain Name System

Explanation:

The Domain Name System is a hierarchical and decentralized naming system for computers, services, or other resources connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities

5 0
3 years ago
why do networking components need more examination from an information security perspective than from a systems development pers
padilas [110]
Networking components will eventually interact with computers and devices outside of itself. Whereas during system development you are only interacting with your program internally.

For example, when you first work on a website you can begin working on it on your personal computer not connected to the outside world. When you are done working on your website you will now upload it to a webserver (or you will create your webserver) and now you are opening up the doors so to speak to the Internet. When you "open the door" you need to make sure the proper security is in place so that no one hacks your site. This is ussually done by making sure the webserver you are on does not have any known security vulnerbilities and has the proper firewall settings to prevent unauthorized access.
4 0
3 years ago
PLEASE HELP WITH MY COMPUTER
qaws [65]

Answer:

try powering it off the turn it back on

Explanation:

5 0
3 years ago
Read 2 more answers
Who can help me on my school we will to google meet and i share my screen
Deffense [45]
Me ......................
7 0
3 years ago
Pls help I will give points
Fed [463]

Answer:

phone !!

Explanation:

since it's a mobile app, that would apply to a handheld device !!

i hope this helps !!

3 0
3 years ago
Read 2 more answers
Other questions:
  • Is bit stuffing necessary in the control or address field in theHDLC protocol? why?
    13·1 answer
  • What are issues to consider when deciding to build software in-house or purchase commercial off-the-shelf software (cots)?
    14·1 answer
  • When a rectangular region is defined using an appropriate style, which value matches the specified edge of the clipping region t
    7·1 answer
  • Direct connections provide continuous access to the Internet. Many bandwidth options are associated with direct connections. Whi
    9·1 answer
  • Convert 15 from decimal to binary. Show your work.
    14·1 answer
  • You are the administrator of a Windows network. When creating a new user account, you specify a security clearance level of top
    8·1 answer
  • The small flash memory used in<br>protable device like Laptop<br><br>​
    10·1 answer
  • Which statements about editing an existing Contact in Outlook are true? Check all that apply.
    9·2 answers
  • This is your code.
    9·1 answer
  • Bob The Penguin is a real you-tuber, and he plays Mine-craft. Who is his owner?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!