1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Misha Larkins [42]
3 years ago
9

Currently, this program will add 6 and 3 together, output the math problem and output the answer. Edit this code so that a rando

m number is generated from 1 - 10 (inclusive) for the variables a and b. Also, instead of adding the two numbers together, the edited program should multiply them, and output the proper math problem and answer. Be sure to update every line of code to reflect the changes needed.
import random

a = 6
b = 3

answer = a + b

print (str(a) + " + " + str(b) + " = " + str(answer))
Computers and Technology
1 answer:
Yakvenalex [24]3 years ago
6 0

I've included my code in the picture below. Best of luck.

You might be interested in
Explain three specific & major security threats to internet users. In each case, address whether or not the vulnerabilities
kherson [118]

Answer:

See explaination

Explanation:

We already know that people all over the world are using the internet to communicate with each other to store their personal data, for the entrainment working in internet, doing online shopping and a lot of things. The user can faced with many threats. These threats are of different form.

The listed and explained below are some of the threats;

a) Compromised browser:-

Most popular browser are targeted and any security flaws exploited immediately. Criminals uses the flaws to gain access to sensitive document and shadow users browsing activity.

Phishing:-

Phishing is simply referring to the spam email or websites. Most times it is used to steal ones data, identity and funds. It looks genuine, this is what makes it hard to detect .

Poisoned websites:-

These are the fake link with hidden malware where the malware creator create a juicy news /video link which attract the user but the destination affect the PCs and the PC give a big virus alert and then compelled a visitor to be aware of the malware.

Misused social media sites:- These are often used in work place these are misused to spread Trojans and malware User download file and put the corporate network at risk .

These threats are not meaningful to the internet of Things (IOT) but there are different things like if you have a CCTV camera and it is connected to internet so by the threads anyone can take control over the cameras it can shut down the camera delete the recording of the camera and other things. There are the other threats.

7 0
2 years ago
The Integers 10, 30, 20 are inserted in that order, into an AVL Tree. Which sequence of commands will make the correct method ca
mel-nik [20]

Answer and Explanation:

After inserting the integers "10", "30" and "20" in an AVL tree, It looks like:

This tree is not balanced. So, to balance this tree, we have to follow some steps:

Step 1 :

After following the LR (Left rotation), Tree will look like:

Step 2 :

Now, following the RL (Right rotation), we will get a balanced AVL tree like:

4 0
3 years ago
What is a zerø-day exploit? No go.ogle >:(
Igoryamba

Answer:A zero-day vulnerability is a vulnerability in a system or device that has been disclosed but is not yet patched. An exploit that attacks a zero-day vulnerability is called a zero-day exploit.

Explanation:

6 0
2 years ago
Each row in a database is a set of unique information called a(n) (A.)table,(B.)record,(C.)object,(D.)field
sashaice [31]

Answer:

-------------------------######################

4 0
3 years ago
Read 2 more answers
Select all the correct answers.
oksano4ka [1.4K]

Explanation: 2 and 5

3 0
3 years ago
Read 2 more answers
Other questions:
  • What are pixels that are the exact same between multiple frames called?
    15·1 answer
  • Drag the correct type of update to its definition.
    5·1 answer
  • Your game design company has recently asked all employees to use a specific personal information management application (PIM) to
    6·1 answer
  • WILL GIVE BRAINLIEST! A rent payment is an example of which type of expense?
    14·2 answers
  • Kyra needs help planning what images and text to use in her web page what technique can help her
    5·2 answers
  • The ________________ command tests connectivity by sending an echo request to a remote computer.
    14·1 answer
  • What is the name of the unique identifier assigned to any personal computer that is connected to the internet?
    11·1 answer
  • Identify a stressor in your life. Conduct an internet search to locate at least two reliable sources of information on effective
    6·1 answer
  • A business letter is not written:
    6·1 answer
  • Can find error , suppose to print what season it is and if fails : Traceback (most recent call last):
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!