Answer:
if full_admission_price = f and discount_amount = d
=> Price of a discount admission = d/f
total_weight
quantity
weight of one item = total_weight/quantity
for i in range(80, 18, -2):
print(i, end=' ')
Explanation:
The first two questions are just mathematical to get a single quantity given some relationship. So, its basically division
For the python code, I used the python's range function which takes in three arguments. The first one is the starting value, the second one is the terminating value which is the number before the terminating value and the last one specifies the common difference popularly known as step in the language. Since the step is 2, only even numbers are printed out. In the print function, I made use of the end keyword specifying a space (' ') as the end. This ensures that the print is done in the same line with a space seperating them. Without that specification, each result will printed in a newline
Then there would be no way to see the output based off what you input. =)
Answer:
Your answer is option C, or the third option.
They do not let the user type in letters, numbers, and words.
Explanation:
Strings are defined as a sequence of characters literal, constant, or variable. These sequences are like an array of data or list of code that represents a structure. Formally in a language, this includes a finite(limited) set of symbols derived from an alphabet. These characters are generallu given a maximum of one byte of data each character. In longer languages like japanese, chinese, or korean, they exceed the 256 character limit of an 8 bit byte per character encoding because of the complexity of the logogram(character representing a morpheme((which is the simpliest morphological(form or structure) unit of language with meaning)) character with 8 bit (1 byte, these are units of data) refers to cpu(central processing unit) which is the main part of a computer that processes instructions, and sends signals.
Answer:
please give me brainlist and follow
Explanation:
There are various phishing techniques used by attackers:
Installing a Trojan via a malicious email attachment or ad which will allow the intruder to exploit loopholes and obtain sensitive information. Spoofing the sender address in an email to appear as a reputable source and request sensitive information