1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Serjik [45]
3 years ago
8

4.2 Lesson Practice​

Computers and Technology
2 answers:
azamat3 years ago
6 0

Answer:

5

10

Explanation:

The first time the loop is entered, c is 0, then 5 gets added and 5 gets printed.

Next time the loop is entered, c is 5, then 5 gets added and 10 gets printed.

Third time the loop is not entered because c<10 is not true anymore.

Why would you not simply try this out on a python environment?

Stolb23 [73]3 years ago
4 0

Answer:

5 and 10

Explanation:

You might be interested in
A group of computers that are interconnected in order to share information or documents is called a
zaharov [31]

Answer:

computer network

Explanation:

group of computers that are interconnected in order to share information or documents.

4 0
3 years ago
The sum of the elements of an integer-valued array recursively calculated as follows: The sum of an array of size 0 is 0; Otherw
Ugo [173]
In what language? Most languages have iterator functions like map in JavaScript that will loop through the elements, making this almost a one liner

sum = 0
arr.map( elem => sum += elem )
8 0
3 years ago
In the game of economics, producers look to technological improvements to increase which of the following?
Vaselesa [24]
They're looking to increase productivity 
7 0
3 years ago
Read 2 more answers
Zach wants to learn a programming language to create games and applications. this programming language will also create web appl
Mkey [24]

Answer:

JavaScript is a good option

6 0
3 years ago
Read 2 more answers
What are the information ethics associated with IP
Naily [24]

Answer:

The IP stands for intellectual property. And the information ethics related to the IP are the transaction privacy, piracy and the privacy for the ease and giveaways, investigation, namelessness. The trade details must be kept private, and not disclosed to anybody, and the piracy is never allowed. Also, the privacy of all sorts must be ensured for ease and giveaways, surveillance, and confidentiality.

Explanation:

Please check the answer section.

3 0
4 years ago
Other questions:
  • Ryan wants to ensure that all the words in this document are evenly spaced so that they look neat and readable . Which option in
    12·1 answer
  • Assessing opportunity cost involves...
    6·1 answer
  • Assume there is a variable , h already associated with a positive integer value. Write the code necessary to count the number of
    13·1 answer
  • ¿dispositivos de hardware Que permite identificar la huella digital registrada por el usuario?
    11·1 answer
  • What types of storage can be used to access your data on another computer?
    7·2 answers
  • The variable most_recent_novel is associated with a dictionary that maps the names of novelists to their most recently published
    12·1 answer
  • What type of things can be marketed
    11·1 answer
  • Cora is writing a program to make a motorcycle racing game. If Cora wants to speed of the motorcycle to appear on the screen whe
    12·1 answer
  • Please say me the answer fast its really urgent........ ​
    12·1 answer
  • List resource you can utilize if you are experiencing technology issued
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!