1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bulgar [2K]
3 years ago
7

What is the output?

Computers and Technology
2 answers:
sammy [17]3 years ago
6 0

Answer:

The answer is 10

Explanation:

i got it right on the assignment

Aleksandr-060686 [28]3 years ago
4 0

Answer:

The output of code is 20.

Explanation:

We need to give output of the following code:

numB = 25

while numB > 13:

numB = numB - 5

print(numB)

Solution:

We will check the condition of while loop, if the condition is true, then the statements inside the loop will be executed. Since brackets are not available so, only one statement is linked with while loop.

Executing the statements, we check condition while numB > 13 (25>13) is true, next statement will be executed numB = numB - 5  (20=25-13) so, when print(numB) will be executed, we will get 20.

The output of code is 20.

You might be interested in
Question 4 of 25
Semmy [17]

A situation which modular design would be least beneficial for a game program is: A. the program is extremely simple.

<h3>What is modular design?</h3>

Modular design can be defined as a software development technique that involves the separation of the overall functionality of a software into independent and interchangeable software sections or modules.

Also, modular design can be used to break a large code in a software into smaller blocks holding specific functions.

In this context, we can infer that modular design would be least beneficial for a game program when the software program is extremely simple.

Read more on modular design here: brainly.com/question/14192464

#SPJ1

6 0
2 years ago
A set of communication rules for the computer to follow is called, what?
Irina-Kira [14]

The answer to this question is protocol

5 0
3 years ago
Read 2 more answers
What does it mean to have liability for a company?
astraxan [27]

you can get tax identification number, open a bank account and do business all under its own name


3 0
3 years ago
Describe Mr. Digby, the principal. ​
Gennadij [26K]

Answer:

stinky

Explanation:

7 0
3 years ago
Knowledge can reside in email, voice mail, graphics, and unstructured documents as well as structured documents.
Vsevolod [243]
<span>Knowledge can reside in email, voice mail, graphics, and unstructured documents as well as structured documents. 
The answer is a. True 

</span>
6 0
3 years ago
Read 2 more answers
Other questions:
  • I plugged my phone up into a charger, the charger sparked and i unplugged my phone and now it wont charge at all, does anyone kn
    13·1 answer
  • When were anonymous inner classes added to java?
    10·1 answer
  • Who were called “freedmen” during the reconstruction period?
    15·2 answers
  • Remote wiping is a device security control that allows an organization to remotely erase data or email in the event of loss or t
    10·2 answers
  • You can use colors, patterns, and borders to enhance the overall appearance of a worksheet and to make it easier to read. One of
    11·1 answer
  • What type of error results from an error in the formatting of the program code?
    13·1 answer
  • A ____ can be used to enter, display, or edit data
    5·1 answer
  • PLS HURRY<br> Look at the image below
    8·1 answer
  • The use of technology to observe a user's actions often without the user's knowledge is known as:
    11·1 answer
  • ________ helps in determining the cause of a security threat in an incident response plan. Question 7 options: A) Restricting sy
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!