1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anit [1.1K]
2 years ago
12

4.8 code practice question 2 edhesive

Computers and Technology
1 answer:
Vladimir [108]2 years ago
6 0

Answer:

for y in range(88, 43, -4):

   print(y, end=" ")

Explanation:

yw

You might be interested in
Why is a class an excellent representation of an abstract data type?
JulsSmile [24]

Answer:

 A class is an good representation of the abstract data type as it is represented independently. For implementing a class, it is use to specify the interface for an abstract class.

Class is one of the type of abstract data type for the objects that whose behavior is basically define by the set of operations and values. It is known as abstract as, it provide an implementation independently.

When the class is using in an abstract data type, then it refers as hidden representation of the data. In this modern era, class is use for the implementation of the abstract data type.

6 0
3 years ago
Which nmap switch is used to detect target OS and services?<br> a -S<br> b -p<br> c -F<br> d -A
antiseptic1488 [7]

Answer:

d -A

Explanation:

The -S switch is used to use a fake source address, and it can mask your ip.

The -p switch is used to indicate which ports you want to scan, because then it searches for all open ports it searches for that one specifically

The -F switch is used as the quick scan mode, scanning the surface

The -A switch is used to check the operating system.

3 0
3 years ago
Many businesses use robotic solutions. Which department of the food and beverage industry uses robotic solutions on a large scal
Alenkinab [10]

Answer:

Its packing you're welcome :)

Explanation:

7 0
3 years ago
Read 2 more answers
Select the correct answer.
TiliK225 [7]

A group of reviewers with your highest ratings

3 0
3 years ago
In MS Word we can merga cells true or false​
sergey [27]
In this video I showed you all of the locations for all items in Wacky Wizards!! I hope you enjoyed and please like and subscribe. Piece out!!!
7 0
2 years ago
Read 2 more answers
Other questions:
  • How has science fiction influenced technology
    7·2 answers
  • vulnerability is a feebleness which allows an attacker to condense a system's information assurance to security,is it true or fa
    14·1 answer
  • Which term is used to describe a password-protected, encrypted data file that verifies the identity of the sender of a message?
    8·1 answer
  • Which of the following combines something you know, such as a password, with something you are (a biometric device such as a fin
    13·1 answer
  • How should you set the OHMS ADJust control on a multitester of analog VOM, for resistance measurements?
    12·1 answer
  • What is conference proceeding​
    10·2 answers
  • The data _____ component of a database management system (DBMS) is used to create and maintain the data dictionary. manipulation
    14·1 answer
  • When is 1600 plus 25 and 1700 minus 35 the same thing?​
    10·1 answer
  • 1. You are given a database to create, however, you realize that in the instructions you are told to create relationships betwee
    5·1 answer
  • outline 4 IDE features that makes software development much faster and more convenient than other alternatives.​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!