1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Artyom0805 [142]
3 years ago
7

HELP!!! What would var d=?

Computers and Technology
1 answer:
sergiy2304 [10]3 years ago
7 0

Answer:

51015

Explanation:

Var b is a string, and it'll treat addition like <em>string concatenation </em>(aka just adding a message.) Since it's concatenation, it'll then turn the numbers/integers into strings.

This kind of behavior might be different depending on the language, though. Some languages might not allow this. (For example, C and C++)

You might be interested in
Edhesive assignment 4
Agata [3.3K]

Answer:

nrToCheck = int(input("How many numbers do you need to check? "))

nrEven = 0

nrOdd = 0

for i in range(nrToCheck):

 number = int(input("Enter number: "))

 if (number % 2):

   nrOdd = nrOdd + 1

   print("{} is an odd number".format(number))

 else:

   nrEven = nrEven + 1

   print("{} is an even number".format(number))

print("You entered {} even number(s).".format(nrEven));

print("You entered {} odd number(s).".format(nrOdd));

7 0
3 years ago
What Hulu shows should I watch? Actually answer tho.
Alina [70]
Mmmmmmm Utopia falls
3 0
3 years ago
Read 2 more answers
Research the design basis threat (DBT) in terms of Cybersecurity for an organization of your choice. Discuss what the Cybersecur
tiny-mole [99]

A Design Basis Threat (DBT) is known to be a characteristics of any given or potential insider and also those of external adversaries, that may try to have or gain unauthorized removal or sabotage, against a physical protection system that was set up designed and evaluated.

<h3>What are Cybersecurity objectives?</h3>

Cybersecurity aims are:

  • To protect computer system,
  • To protect networks,
  • To protect software programs from such cyber attacks.

Note that a lot of digital attacks are targeted at accessing, changing, or deleting sensitive information as well as others.

Learn more about IT from

brainly.com/question/1276995

#SPJ1

3 0
2 years ago
Which of the following are logical reasons for using a pie chart to show how employees spend their time at ABC organization? Cho
MissTica

Answer:

1,2, and 4 I believe

Explanation:

I hope that helped :D

5 0
3 years ago
The Program Manager just received approval of his proposed acquisition strategy with one exception: he has been directed to make
Llana [10]

Answer: The options related to your question is missing below are the missing options

-Use metrics to manage

-Use system based software design

-Assess reuse risks and cost

-Inspect requirements and design

answer:

Assess reuse risks and cost ( option 3 )

Explanation:

The best software acquisition practice that is most applicable to his situation is : Assess reuse risks and cost

The reuse of technology, code and infrastructures will help reduce the risks or wastage of available resource. and  also saving cost for the firm as well.

3 0
3 years ago
Other questions:
  • . What type of device is a computer? Where does it use?​
    14·1 answer
  • Important tools used in the _____ phase of the DMAIC process include a project charter, a description of customer requirements,
    10·1 answer
  • You want to copy data from one cell or range to an adjacent cell or range in your spreadsheet, without using a shortcut key. Whi
    10·1 answer
  • Micro sleep is when you ____.
    11·2 answers
  • The steps.txt file contains the number of steps a person has taken each day for a year. There are 365 lines in the file, and eac
    12·1 answer
  • I need help now I really do what is the answer thank you
    5·1 answer
  • In designing a database, a database administrator should consider..
    12·2 answers
  • When can screentips be useful? when finding a tab when looking for a command when pinning the ribbon when using a command.
    8·1 answer
  • 1. Keisha is in her first semester of college and is taking 10 credit hours: ACA 122, CIS 110, PSY 150, and developmental math.
    11·1 answer
  • Which code snippet is the correct way to rewrite this in Semantic HTML?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!