1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
polet [3.4K]
3 years ago
11

what would be the result of running these two lines of code

Computers and Technology
1 answer:
MatroZZZ [7]3 years ago
8 0

Answer:

Jog

Explanation:

The variable options is a list containing 5 string values

options = ["ski", "surf", "jog", "bike", "hike"]

Indexing in python starts from 0 ; hence the index values of the list values are :

0 - ski

1 - surf

2 - jog

3 - bike

4 - hike

The statement ;

print(options[2]) means print the string at index 2 in the list named options

The string at index 2 is jog ;

Hence, the string jog is printed.

You might be interested in
To include all fields in a sql query, use the ____ symbol after the word select.
dolphi86 [110]
SQL is a standard language for storing, manipulating and retrieving data in databases and t<span>he SELECT statement is used to select data from a database.</span>
To include all fields in a SQL query, use the * symbol after the word select. The symbol * is used after the word SELECT. This way it indicates that you want to include all fields in the query results in the order in which you described them to the DBMS when you created the table.​
4 0
4 years ago
The length, height, and width of a cube are 10, 7, and 5 cm respectively. Write a program that calculates the volume, perimeter,
RideAnS [48]

Answer:

// code in C++.

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

   // variables

   int length=10,height=7,width=5;

   // find the volume of

   int vol=length*height*width;

   // find the surface area

   int sa=2*(length*width+length*height+height*width);

   // find the perimeter

   int peri=4*(length+width+height);

   // print the volume

   cout<<"Volume is: "<<vol<<" cm^3."<<endl;

   // print the surface area

   cout<<"Surface area is: "<<sa<<" cm^2."<<endl;

   // print the perimeter

   cout<<"Perimeter is: "<<peri<<" cm."<<endl;

return 0;

}

Explanation:

Declare and initialize length=10, width=5 and height=7.calculate volume by multiply length, width and height and assign to variable "vol".Then find the surface area as 2*(length*width+length*height+height*width) and assign it to variable "sa".Then find the perimeter as 4*(length+width+height) and assign to variable "peri". Print the volume, perimeter and surface area.

Output:

Volume is: 350 cm^3.

Surface area is: 310 cm^2.

Perimeter is: 88 cm.

8 0
3 years ago
How could your program be useful in the real world?
anyanavicka [17]

Answer:

to answer the question I need to know what your program is and what it does

3 0
3 years ago
Operating systems of mobile devices can support full scale software programs like microsoft word or excel
aliya0001 [1]
Iit is microsoft word
5 0
4 years ago
Cryptography has requirements include:
ki77a [65]

Answer:

A

Explanation:

Cryptography is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents. ... When transmitting electronic data, the most common use of cryptography is to encrypt and decrypt email and other plain-text messages.

4 0
3 years ago
Other questions:
  • To move down one paragraph, press the ____ key(s).
    15·1 answer
  • Many web pages today use ____ —small text files that are stored on your hard drive by a web server, typically the one associated
    6·2 answers
  • Whats the relationship between cpu memory and disk​
    10·1 answer
  • What could cause a fixed disk error.
    15·1 answer
  • What is a systems development life cycle?
    5·1 answer
  • If you have four documents open and click the x button on the title bar, _____.
    8·1 answer
  • What led to fall of axum?
    15·2 answers
  • Which of the following statements is NOT true regarding the Security Configuration and Analysis (SCA) tool?
    12·1 answer
  • 2.20 Write an expression involving a three-letter string s that evaluates to a string whose characters are the characters of s i
    6·1 answer
  • Cisco cyber security would classify this email?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!