1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aliina [53]
3 years ago
11

What is the output of the program?

Computers and Technology
1 answer:
Sergio [31]3 years ago
5 0

Answer:

the output of the above program is

2 3

3 5

8

Explanation:

It seems the program is trying to pair two numbers into one and leaving the unpaired number (in a case of odd number of numbers) as a separate output.

This is why numbers 2 and 3 form 23, numbers 3 and 5 form 35 and 8 is another output of the program.

You might be interested in
Which of the instances below is an example of a Trojan horse? Question 2 options: a) An attachment in an email that is really a
sergij07 [2.7K]

Game-theif Trojans is the malware that makes a backdoor into your email account by which you are playing a game or has downloaded it and thus by this all information of user is exposed.

So option D is the answer.

Option A cannot be answer because Trojan does not use files for its purpose.

Option B cannot be a good option because Trojan works in online could.

Option C cannot be a option because Trojan does not need executable to attack your account.

3 0
3 years ago
Read 2 more answers
The term which refers to the attempt to gain unauthorized access to systems and computers used bya telephone company to operate
Alex787 [66]

Answer: Phreaker

Explanation:

Phreaker is defined as the unauthorized attack on  authorized communication system for stealing and manipulation phone networks.

  • Exploring,searching and identifying telecommunication field with help of technologies,equipment,tools etc is done to exploit the system and resources .
  • Other options are incorrect because phone hacking is attacking phone device, [email protected] is also hacking source and hacktivist hacks system to impact social and political field.
  • Thus, the correct option is option(d)
8 0
3 years ago
Which is a method used to determine database requirement?
Ivahew [28]

Answer:

I think it would be A, good luck!

8 0
3 years ago
How to format each dictionary item as a text string in the input file. How to covert each input string into a dictionary item. H
Jet001 [13]

Answer:

- To get the items of a dictionary and print them as a string, use the items() method to unpack the keys and values in a for and print or write them into a file.

for key, value in mydict.items():

   print(f"{key}, {value}")

- To convert string from user input into dictionary;

   mystring = input().split(" ")  #assuming the words are separated by a space.

   from word in mystring:

       mydict[word] = mydict.get(word, 0) + 1

This would use the words in the string as the keys of the dictionary and the count of each word as the respective values.

Explanation:

A dictionary is a data structure in python used to store data in key-value pairs. The items are enclosed in curly braces and can be accessed with the key in dot or bracket notation.

7 0
3 years ago
A(n) ____________ allows many users to share the same set of files on a common, shared disk drive.
dlinn [17]

A  <u>file server </u>allows many users to share the same set of files on a common, shared disk drive.

<h3>What is the type of reliable file server used in many networks?</h3>

A LAN can have many additional types of dedicated servers. Four common types are file servers, database servers, print servers, and contact servers.

File servers permit many users to share the same set of files on a common, shared disk drive.

<h3>What is a server used for?</h3>

A server stores send and receive data. In essence, it "serves" something else and exists to supply services. A computer, software program, or even a storage apparatus may act as a server, and it may supply one service or several.

To learn more about file server , refer

brainly.com/question/24243510

#SPJ4

5 0
2 years ago
Other questions:
  • What is a main cause of a virus on a computer
    6·1 answer
  • Plz help me! No guessing plz!
    13·1 answer
  • What two factors make up the skills of a good typist
    6·1 answer
  • Please help me!! 10 Points are waiting!!
    8·1 answer
  • Given two models applied to a data set that has been partitioned, Model A is considerably more accurate than model B on the trai
    7·1 answer
  • How you will install an operating system on your computer
    5·1 answer
  • Which wildcard characters will return a single character when using the Find dialog box?
    6·2 answers
  • The variables xp and yp have both been declared as pointers to integers, and have been assigned values. Write the code to exchan
    6·1 answer
  • George is working with an image in Photoshop. He added a lot of effects to the image. He saved the first draft of the file. The
    6·2 answers
  • Positive use of the technology before the pandemic.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!