1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SashulF [63]
3 years ago
9

Use python

Computers and Technology
1 answer:
Degger [83]3 years ago
3 0

Answer:

def rec_dig_sum( num ):

   num_list = [ digit for digit in str(num)]

   total = 0

   for x in num_list:

       total += x

   return total

def dict_of_rec_dig_sums(low, high):

   mydict = dict()

   for number in the range(low, high+1):

      mydict[rec_dig_sum(number)] = number

   return mydict

Explanation:

The python program defines two functions, "rec_dig_sum" and "dict_of_rec_dig_sums". The former accepts a number and returns the sum of the digits of the number while the latter accepts a low and high number range.

The program returns a dictionary with the recursive sum as the keys and the number count as the values.

You might be interested in
Please explain what Level 5 Automation is and give 2 examples of the technology.
arsen [322]

Level 5 ( Full Driving Automation ) Level 5 cars won't even have steering wheels or acceleration / braking pedals . They will be free from geofencing , able to go anywhere and do anything that an experienced human driver can do .

Pls follow me and Mark as brainlest!!! :-)

8 0
2 years ago
An online service provider provides its users with hosted​ computers, an operating​ system, and a database management system​ (D
kondaur [170]

Answer:

<em>platform as a service (PaaS)</em>

Explanation:

Platform as a Service (PaaS) <em>is a cloud services system in which a third-party vendor offers hardware and software services</em> – usually the ones required for the production of applications – to internet users.

The hardware and software are managed by a PaaS company on its own network.

As more of a consequence, PaaS helps users to access in-house technology for designing or running a new app.

8 0
3 years ago
Which of the following detects unauthorized user activities, attacks, and network compromises, alerts of the detected attacks, a
Anit [1.1K]

The answer is IPS (Intrusion Prevention Systems)

The Intrusion Prevention Systems and Intrusion Detection Systems (IDS) are two security technologies that secure networks and are very similar in how they work. The IDS detects unauthorized user activities, attacks, and network compromises, and also alerts. The IPS, on the other hand, as mentioned, is very similar to the IDS, except that in addition to detecting and alerting, it can also takes action to prevent breaches.


3 0
3 years ago
Computers automatically name the main hard drive the_____ drive?
telo118 [61]

Answer:

Im not entirely sure but I think this is disk drive

Explanation:

6 0
3 years ago
What is the MAIN purpose for including a foil in a story?
Lana71 [14]

Answer: reveal information about characters and their motivations

Explanation: to show data about the person to know if the person is mean or happy small or tall and more stuff and to say if they want to save the turtles or trees

5 0
3 years ago
Other questions:
  • The numbers on the bottom of a typical check represent all of the following EXCEPT?
    12·2 answers
  • The acronym is used to define the process that allows multiple devices to share a single routable ip address.
    6·1 answer
  • The dlci field in the frame relay header is _________ bits long.
    14·1 answer
  • A.<br> Post-It note<br> b.<br> notebook<br> c.<br> tutor<br> d.<br> spell check
    14·1 answer
  • After clicking the Start button on your computer screen desktop, what option would you then select to examine system components
    5·1 answer
  • One of the disadvantages of an e-marketplace is that it cannot provide a single platform for prices. true or false?
    10·2 answers
  • Entering the search criteria "B?" would yield which of the following results?
    6·1 answer
  • You are given the task of reading in n numbers and then printing them out in sorted order. Suppose you have access to a balanced
    12·1 answer
  • High level language is___________
    15·1 answer
  • Which privacy protection uses four colors to indicate the expected sharing limitations that are to be applied by recipients of t
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!