1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
slavikrds [6]
3 years ago
9

8.3 code practice edhesive PLEASE HELP AND HURRY

Computers and Technology
1 answer:
NemiM [27]3 years ago
8 0

Answer:

numbers = '14 36 31 -2 11 -6'

nums = numbers.split(' ')

for i in range(0, len(nums)):

  nums[i] = int(nums[i])

print(nums)

You might be interested in
Three broad categories of cryptographic algorithms are commonly used to create PRNGs: symmetric block ciphers, asymmetric cipher
RideAnS [48]

Answer:

True.

Explanation:

In generating PRNGs, several specific types of crypto algorithms will be widely will use: linear cipher block, nonlinear ciphers, as well as hash methods and authorization instructions in messages. So, that's why the following scenario is true about the cryptographic algorithms because this is a collection of several excellently defined however complicated mathematics techniques for encoding or decoding information.

7 0
4 years ago
Refer to the exhibit. The web servers WS_1 and WS_2 need to be accessed by external and internal users. For security reasons, th
BigorU [14]

Answer:

c.Ports Fa3/1 and Fa3/2 on DSW1 will be defined as secondary VLAN isolated ports. Ports Fa3/34 and Fa3/35 will be defined as primary VLAN promiscuous ports.

Explanation:

Primary VLANs which can only be reached by using promiscuous port, comprises of the gateway and isolated VLANs for users to get out of a network.

The isolated ports can only communicate i.e send and receive data with the promiscuous ports; Fa3/34 and Fa3/35.

Also, WS_1 and WS_2 can neither send nor receive data with the data server, thus we isolate them.

3 0
4 years ago
Given a string on one line and an integer index on a second line, output the character of the string at that index.
morpeh [17]

The code is in Java.

It uses a built-in function named chartAt() to get the character at the entered index.

Recall that built-in functions are functions that are already defined in the language. We can use them by calling the function and passing the required argument. The chartAt() function takes an index and returns the character at that index.

Comments are used to explain each line of the code.

//Main.java

import java.util.Scanner;

public class Main

{

public static void main(String[] args) {

    //Scanner object to get input from the user

    Scanner input = new Scanner(System.in);

   

    //Declaring the variables

    String s;

    int index;

    char c;

   

    //Getting the inputs

    s = input.nextLine();

    index = input.nextInt();

   

    //Getting the character at the index using the charAt() function

    c = s.charAt(index);

   

    //Printing the character

 System.out.println(c);

}

}

You may check the following link to see another similar question:

brainly.com/question/15688375

5 0
3 years ago
Discuss data and its types from computer programming and data analysis prospectively?​
Hoochie [10]

Answer:

With the use of data and their types the extent of how much data can be stored can get insanely large. types like doubles and longs allow for a range of values nearly incomprehensible in their size for storing user information, web pages, games ect. Using them essentially allows you to plan for the future of the size of whatever you're creating. On top of that, it allows for a preciseness not typically able to be reached without these types.

3 0
3 years ago
_______________, such as BASIC, Python, Java, Prolog, and C , make the programming process easier by replacing unintelligible st
musickatia [10]

Answer:

High level Languages

Explanation:

High level languages are made so that the byte code, Assembly code that computers can understand should be converted into a higher level human understandable languages such as Python,C++. Also, remember that the compilers of these languages such as Visual studio ultimately converts the high level code into low level code ( Assembly code ) that computers can understand.

8 0
3 years ago
Other questions:
  • The technology Herman Hollerith created in the 1880s began the modern-day data processing function in computers.
    5·1 answer
  • Which topology enables only one person, at one time, to send data to others on the network?
    6·1 answer
  • An organization’s IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the
    5·1 answer
  • Which of the following representations in two's complement notation represents the largest value?
    12·2 answers
  • Which of the following is part of a person's digital footprint? *
    5·1 answer
  • Using social media, such as text messages and status updates, has helped
    10·1 answer
  • What social media profession entails determining how and in what way an organization will create and maintain a social media pre
    7·1 answer
  • After reviewing device security you learn that a malicious user in an airport
    14·1 answer
  • What is the main advantage of using a WYSIWYG("what you see is what you get")editor when constructing a website
    5·1 answer
  • All languages require the code which is simply a word that means _____.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!