1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elina [12.6K]
3 years ago
9

What are the missing words in the program? divide(numA,numB): numA/numB

Computers and Technology
2 answers:
vladimir1956 [14]3 years ago
8 0

Answer:

def and return

Explanation: got it right on edg 2021

Alex787 [66]3 years ago
7 0

If you just want to get the quotient of numA and numB from the function, it would look like this:

def divide(numA, numB):

   return numA/numB

If you want to get the quotient of numA and numB from the function and then print that value to the screen, it would look like this:

def divide(numA, numB):

   return numA/numB

print(divide(1,1))

You can replace those 1's with any number you want.

You might be interested in
The Early Days (Pre-Mechanical Period)​
Irina18 [472]

Answer:

The earliest age of technology. It can be defined as the time between 3000 B.C. and 1450 A.D. When humans first started communicating, they would try to use language to make simple pictures – petroglyphs to tell a story, map their terrain, or keep accounts such as how many animals one owned, etc.

<h2>Please mark me as brainliest</h2>

7 0
2 years ago
What type of system security malware allows for access to a computer, program, or service without authorization?
olasank [31]

Answer:

"backdoor" is the correct answer for the above question

Explanation:

  • The backdoor is a type of attack which is done by the type of backdoor programs to remotely access the computers without the authorization of the user of the computer.
  • It is inserted on the computer with the help of the internet and accessed the computer without using authorization techniques.
  • The above question asked about the virus which is used to access the computer without the permission of the right use of the system. Hence the answer is backdoor which is defined above.
7 0
4 years ago
Which of the following is true of equilibrium? *
SashulF [63]
B, it’s when the supply and demand are equal
7 0
3 years ago
Question is in photo
Alisiya [41]
Is this java or python pls explain or else i can’t answer
3 0
3 years ago
Team members support one another when they view differences as being? A) annoyances they can live with B) signs of poor training
cricket20 [7]
C (dont mind this sentence it is so that i can reach 20 characteristics)




























                                          
6 0
3 years ago
Read 2 more answers
Other questions:
  • What is the subjects under artificial intelligence ?​
    15·1 answer
  • You have just installed the microsoft windows 7 operating system on your pc. which web browser is bundled with windows 7 and is
    12·1 answer
  • I NEED HELP PLEASE ITS TIMED
    9·1 answer
  • Hi weegy, what is the latest android os?
    9·1 answer
  • Network layer functionalities can be broadly divided into data plane functionalities and control plane functionalities. What are
    8·2 answers
  • How was the Big Ben project similar to the investigation you conducted in class to determine if the table was vibrating? How is
    7·1 answer
  • El planeamiento estratégico de una empresa es​
    9·1 answer
  • Write the code to produce a for loop that counts down from 20 to 0 by 2’s and prints the number each time it goes through the lo
    15·1 answer
  • To edit the color of the text in Word Online, choose the Font color command under what tab?
    8·1 answer
  • Debbie can use the feature in the email to copy her manager on the email without her colleague knowing she did so
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!