1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jarptica [38.1K]
3 years ago
5

Write a for loop to print the numbers from 20 to 30, inclusive (this means it should include both the 20 and 30). The output sho

uld all be written out on the same line. Expected Output 20 21 22 23 24 25 26 27 28 29 30
Computers and Technology
1 answer:
soldi70 [24.7K]3 years ago
3 0

In python:

for i in range(20, 31):

   print(i, end=" ")

You might be interested in
Which data type does not allow duplicate values-python
kkurt [141]

Answer:

Set

Explanation:

A set is unique in Python. It does not allow duplicates

6 0
2 years ago
Security is a major concern with m-commerce. How can m-commerce software ensure the security of transmissions and that the trans
dimaraw [331]

Answer:

Security in communication between applications and sites in m-commerce can use SSL technology.

Explanation:

While developing an app, developers have to perform several checks and ensure that the server has a legitimate certificate.

7 0
2 years ago
reagan's firm has not had to make large investments in computer or networking hardware or in personnel to maintain the hardware
GrogVix [38]

Since Reagan's firm has not had to make large investments in computer or networking hardware, the  key benefit of public cloud computing is option B:  reduced costs.

<h3>What equipment is employed for networking?</h3>

There are different kinds of equipment for networks. Hardware for networking is required for computers to communicate with one another. Bridges, hubs, as well as switches, and routers are all networking devices with slightly varied functions.

Therefore, In a public cloud, resources are made available by a third party provider through the internet and shared by businesses and individuals who want to use or buy them and low cost is a good advantage.

Learn more about cloud computing  from

brainly.com/question/19057393
#SPJ1

3 0
1 year ago
Refer to the method f:
Goshia [24]
<h2>This function will land up in infinite function call</h2>

Explanation:

first time when the function gets invoked,

f(6,8), so k=6 & n=8, inside the function it checks k==n, ie. 6==8, returns false, then one more if is available, so 6>8 is check for , once again it is false and else loop is executed, the function is called recursively using f(k-n,n), that is f(6-8,8), it means f(-2,8) is passed.

Second time,

if(-2==8) is false, so if(-2>8) is again false and function f(-10, 8) is called

if(-10==8) is false, so if(-10>8) is again false and function f(-18,8) is called

if(-18==8) is false, so if(-18>8) is again false and function f(-26,8) is called

So this goes recursively and ends in an infinite function call.

5 0
4 years ago
A personal phone directory contains room for first names and phone numbers for 30 people. Assign names and phone numbers for the
Fynjy0 [20]

Answer:

# include <iostream.h>

# include <stdio.h>

# include <string.h>

using namespace std;

class citizen

{      

    int i;

    public string name[30];

    public long int phonenumber[30];

    public void addindividual(string name1)

     {      

           If (i<=30)

            {     int flag=0;

                  for(int j=0; j<=i;j++)

                  {

                     if (strcmp(name[i], name1)

                      {

                          flag=1;

                      }

                     else

                     {  

                           flag=0;

                     }

                  }

                  If (flag)

                 {

                  if (i<30)

                  {

                  for(j=i+1;j<=30; j++)

                  {

                        cout<<"Enter the name:"; getchar(name[j]);

                        cout<<"Enter the phone number:"; cin>>phonenumber[j];

                         i++;

                   }

                  else  

                   {

                        cout<<"The person already exists";

                        exit();

                   }

              }

            else

             {

                 cout<<"array is full:";

                 exit();

             }

     }

}

Void main()

{

     string str;

    cout<<" Enter name:";

    getline(cin, str); ;

     citizen c1=new citizen();

     c1.addindividual(name1);

}

Explanation:

With a little more effort you can make the program allow the user to enter any number of details, but less than 30 overall. We have used here flag, and as a programmer we know why we use the Flag. It is used to check whether certain Boolean condition is fulfilled or not. Here, we are checking whether a given name is present in the array of names, and if it is not present, we add that to the list. And if the name is present, we print, it already exist.

4 0
3 years ago
Other questions:
  • Difference between video game laser and projectile
    9·1 answer
  • The UML models operations by listing the operation name preceded by an access modifier. A(n) ________ indicates a public operati
    7·2 answers
  • In a fully underwritten offering a firm sells 1 million shares of stock through a fully underwritten offering. Their banker char
    10·1 answer
  • All of the following are benefits of automation except
    5·1 answer
  • Software licensed using the Open Software Initiative (OSI) definition
    5·2 answers
  • What is the bit pattern (raw binary) of the single precision representation of the decimal number 0.125 following IEEE 754 stand
    9·1 answer
  • Memory cards from your cameras (SD cards) and flash drives are examples of __________.
    13·1 answer
  • Need answer ASAP
    14·1 answer
  • A group of two or more computer systems linked together via communication devices is called:.
    10·1 answer
  • You will need to convert the following binary numbers to hexadecimal. Table 1 contains 16 problems. The first one is completed f
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!