1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nikolay [14]
2 years ago
12

Code in Python

Computers and Technology
1 answer:
KIM [24]2 years ago
4 0

You're setting the value of user_num to 20. Doing this won't allow the other test cases to run. Simply delete that line and your code should work. This is the code I wrote:

user_num = int(input())

while user_num>=1:

   user_num/=2

   print(user_num)

I wrote my code in python 3.8. I hope this helps.

You might be interested in
Top 5 best comedy or action movies.
Cloud [144]
Comedy movies you should watch is
grown ups
spider man into the spider verse
action movies you can do
like a fast and furious movie ?
some cool scary movies are
the strangers
insidious
and the serbian film :)
7 0
3 years ago
Read 2 more answers
Identify why research and a clearly written problem statement are important. Select all that apply. They result in a clear and c
saveliy_v [14]

Answer:

They result in a clear and concise statement of the problem

They ensure that all stakeholder needs are considered.

They result in a document that is easy to understand

Explanation:

Problem statement are very vital in research they are key notes that tells what the research is all about and solution it will provide. They are key notes to understand a research and the knowledge gap the research is filling.

Problem statement is a guide through which solution are measured, it gives a clear direction of what the research is all about.

Problem statement are usually easy to understand, they are written in ways that everyone who picks the paper up can understand why the research was conducted.

All this are why a problem statement is important.

7 0
3 years ago
Read 2 more answers
A security team has downloaded a public database of the largest collection of password dumps on the Internet. This collection co
Scorpion4ik [409]

Answer:

a. Password length, password encryption, password complexity

Explanation:

Under this scenario, the best combination would be Password length, password encryption, password complexity. This is because the main security problem is with the user's passwords. Increasing the password length and password complexity makes it nearly impossible for individuals to simply guess the password and gain access, while also making it extremely difficult and time consuming for hackers to use software to discover the password as well. Password excryption would be an extra layer of security as it encrypts the password before storing it into the database, therefore preventing eavesdroppers from seeing the password and leaked info from being used without decryption.

4 0
3 years ago
This is tech question related to mobile and PC.
love history [14]

I am guessing the bluetooth process is same as usb proccess. So when i transfered a video via usb and took out the usb (for apple phone), there <u>was</u> a file but when i clicked it it said that the phone isn't plugged in

4 0
3 years ago
A while loop uses a(n) ___________ at the top of every iteration to test whether to continue or not.
Anni [7]

Answer:

boolean

Explanation:

while loops test to see if something is true or false to know when to continue the loop

8 0
2 years ago
Other questions:
  • which of these paste options is commonly available from the paste options button? A&gt; use the destination them. B. keep the em
    14·2 answers
  • ​PeroxyChem's IT staff was able to free its IT staff to spend less time on routine maintenance and more time on strategic tasks
    11·1 answer
  • Which type of graph or chart will you use to show changes in data points?
    5·1 answer
  • Explain what middleware is. Name a common middleware in two-tier client/server architecture for database applications.
    10·1 answer
  • Why do bats sleep upside down
    7·1 answer
  • True or False <br><br> Rootkits are only made by black-hat hackers.
    8·1 answer
  • You wouldn't think a simple shop like Dippy Donuts would be an interesting target for hackers. But look beyond the donuts and yo
    7·1 answer
  • How to solve household arithmetic​
    7·1 answer
  • In what ways is the human brain like a computer? In what ways is it different?
    14·2 answers
  • Please help me with these questions. Thanks o((&gt;ω&lt; ))o
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!