Answer:
The solution code is written in Python 3
- total = 0
- count = 0
- neg = 0
- pos = 0
-
- num = int(input("Enter an integer: "))
-
- while(num != 0):
- total += num
- count += 1
-
- if(num < 0):
- neg += 1
- else:
- pos += 1
-
- num = int(input("Enter an integer: "))
-
-
- print("The number of positives: " + str(pos))
- print("The number of negatives: " + str(neg))
- print("The total is " + str(total))
- print("The average is " + str(total/count))
Explanation:
Firstly, we create four variables, <em>total</em> , <em>count,</em> <em>neg</em> and <em>pos </em>(Line 1- 4). This is to prepare the variable to hold the value of summation of input integer (<em>total</em>), total number of input number (<em>count</em>), total negatives (<em>neg</em>) and total positives (<em>pos</em>).
Next, we prompt user for the first integer (Line 6).
Create a sentinel while loop and set the condition so long as the current input number, <em>num</em> is not equal to zero. the program will just keep adding the current <em>num</em> to total (Line 9) and increment the count by one (Line 10).
if <em>num</em> smaller than zero, increment the <em>neg</em> by one (Line 13) else increment the <em>pos </em>by one (Line 15). This is to track the total number of positives and negatives.
Finally, we can display all the required output (Line 20 - 23) using the Python built-in function <em>print()</em> when user enter 0 to terminate the while loop. The output shall be as follows:
The number of positives: 3
The number of negatives: 1
The total is 5
The average is 1.25
Answer: d. should be lowercase.
Explanation:
ID attributes are case sensitive for the most part - DOM and Java Script - which means that the ID attribute does not always have to be lowercase.
It can be uppercase as well. ID attributes can also start with a number and as of HTML 5 can start with a special character as well. Finally, the ID attribute must always be unique within each document.
The step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs is option a: maintain access.
<h3>What is maintaining access in penetration testing?</h3>
“Maintaining Access” is a stage of the penetration testing life cycle and it is said to have a real purpose.
It is one that tends to allow the pentester to stay in the set systems until he get the information he need that is valuable and then manages to take it successfully from the system.
Hence, The step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs is option a: maintain access.
Learn more about penetration testing from
brainly.com/question/26555003
#SPJ1
Answer:
A form is closed
A form is resized.
A form is opened
A user presses a key
A user moves the mouse
Explanation:
There are different events in a form, and we can use them in different situations like:
- We can use On Resize to resize our form.
- If we On Load the form will be displayed.
- On Clicked, If there was a click in an object
- On Unload to close the form.
- On Mouse Enter and On Mouse Leave, in this case, the mouse enters or leaves the object.