1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bulgar [2K]
3 years ago
7

What is the output?

Computers and Technology
2 answers:
sammy [17]3 years ago
6 0

Answer:

The answer is 10

Explanation:

i got it right on the assignment

Aleksandr-060686 [28]3 years ago
4 0

Answer:

The output of code is 20.

Explanation:

We need to give output of the following code:

numB = 25

while numB > 13:

numB = numB - 5

print(numB)

Solution:

We will check the condition of while loop, if the condition is true, then the statements inside the loop will be executed. Since brackets are not available so, only one statement is linked with while loop.

Executing the statements, we check condition while numB > 13 (25>13) is true, next statement will be executed numB = numB - 5  (20=25-13) so, when print(numB) will be executed, we will get 20.

The output of code is 20.

You might be interested in
Consider the following code:
Phoenix [80]

Answer:

customers += newCustomer;

Explanation:

The operator += expands into + and assignment. The assignment is not overloaded so the required code is

customers += newCustomer;

This expands into

customers = customers + newCustomer;

The overloaded + operator is called for the right expression. This returns a `CustomerList`, which is then assigned through the = operator to `customers`.

3 0
3 years ago
Grid computing is a type of computing in which:
fredd [130]

Answer:

b

Explanation:

A computing grid can be thought of as a distributed system with non-interactive workloads that involve many files.

7 0
3 years ago
Which is true about a computerized spreadsheet?
morpeh [17]
"A computerized spreadsheet automatically recalculates when changes are made to the data" is the one among the following that <span>is true about a computerized spreadsheet. The correct option among all the options that are given in the question is the third option or option "C". I hope it helps you.</span>
5 0
3 years ago
¿Por qué la tecnología o su uso debe ser "sostenible"? ¿Qué significado tendrá esta palabra?
KengaRu [80]

Explanation:

Las tecnologías sostenibles son aquellas que emplean menos energía para realizar los procesos, emplean una cantidad menor de recursos limitados y, en definitiva, no agotan los recursos naturales tanto en su creación, puesta en marcha o utilización

6 0
3 years ago
A programmer hacks software code to understand how it works. Then she writes a program that replicates the implementation of a s
Setler [38]

Answer:

Patent violation.

Explanation:

Patent can be defined as the exclusive or sole right granted to an inventor by a sovereign authority such as a government, which enables him or her to manufacture, use, or sell an invention for a specific period of time.

Generally, patents are used on innovation for products that are manufactured through the application of various technologies.

Basically, the three (3) main ways to protect an intellectual property is to employ the use of trademarks, copyright and patents.

In this scenario, a programmer hacks software code to understand how it works. Then she writes a program that replicates the implementation of a solution that has already been granted intellectual property protection.

Hence, this is an example of a patent violation because she was not given the permission or rights by the intellectual property owner to modify the software.

4 0
3 years ago
Other questions:
  • What command will unregister a component when run?
    12·2 answers
  • He smallest network is a ______________________, which is a network of personal devices, such as the network you use when you sy
    5·1 answer
  • What is the subnet mask ?
    9·2 answers
  • write a program that asks the user to enter a positive integer, then prints a list of all positive integers that divide that num
    6·1 answer
  • Leo noticed that attackers have breached his wireless network. They seem to have used a brute-force attack on the WiFi protected
    13·1 answer
  • Create the following SQL Server queries that access the Northwind database. Place them in a zip file and place the zip file in t
    6·1 answer
  • Pls someone help me with these four questions
    8·1 answer
  • An early attempt to force users to use less predictable passwords involved computer-supplied passwords. The passwords were eight
    10·1 answer
  • For each problem listed below, use the drop-down menu to select the field of the professional who can help solve the issue.
    7·2 answers
  • Which of the following items in the folder window allows users to view locations which have been visited before?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!