1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iVinArrow [24]
2 years ago
11

Write a program that uses a while loop to calculate and print the multiples of 3 from 3 to 21. Your program should print each nu

mber on a separate line. Expected Output:
3
6
9
12
15
18
21
Computers and Technology
1 answer:
nexus9112 [7]2 years ago
6 0

Code:

num = 3

while num <= 21:

   print(num)

   num+=3

Output of code:

3

6

9

12

15

18

21

Explanation:

The condition num <= 21 will ensure that the program will only print multiples of 3 up to 21. We set num as 3 since we want to start printing from 3, and we add 3 each time to get the multiples.

Hope this helps :)

You might be interested in
Four differences between fourth and fifth generation of computers​
Juliette [100K]

Answer:

 The following are the four difference between the fourth and the fifth generation of the computer that are:

  • The fourth generation computer technology is basically based of the microprocessor. On the other hand, the fifth generation computer is based upon the artificial intelligence technology.  
  • The fourth generation computer system are faster in computation. Whereas, the fifth generation computer are more reliable and faster in speed as compared to all other generations.
  • The fifth generation computer are small in the size and more potable as compared to the fourth generation computer system.
  • Laptop, notebook and Chromebook are some of the example of fifth generation. Whereas, STAR 100 and IBM 4341 are the example of fourth generation.
7 0
3 years ago
In the __________ Standard, chemical manufacturers, importers, and distributors are required to provide hazard information by wa
Bas_tet [7]
The correct answer is C
5 0
3 years ago
The isometric projection camera technique provides an illusion of perspective by using things like parallax scrolling to create
Oksi-84 [34.3K]

Answer:

False.  

Explanation:

In this question some information is missing the question does not mention which type of question is this. This question is a true/false type question.

isometric projection camera is an engineer or the technical drawing in which we represented the 3D(three dimensional) objects in the 2D(Two dimensional) objects. This camera representing the object in a visual manner. isometric projection is also known as Isometric drawing, In the isometric projection camera, all the angles are equal. It does not provide an illusion perspective by using parallax scrolling to create the illusion of 3D in a 2D game.

3 0
3 years ago
Ginny just enrolled in a C-SNP that uses the post-enrollment verification method. When will the plan send her a termination noti
Zolol [24]

The plan will be sent to her for a termination notification letter at the end of her first month of her enrollment.

<h3>What is a notification of termination?</h3>

A notice of termination is known to be that which is often given to an employee or a person and it states that it is the end of their employment or other contract.

Hence, The plan will be sent to her for a termination notification letter at the end of her first month of  her enrollment.

Learn more about verification method from

brainly.com/question/17274244

#SPJ1

6 0
2 years ago
3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All
ELEN [110]

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

7 0
3 years ago
Other questions:
  • This provides an easy method for workers to use their computers.
    11·2 answers
  • Functions that are built-in into PHP to perform some standard operations.
    15·1 answer
  • What is the most likely result of making a plan for life after high school
    14·1 answer
  • Which of the following are documents that can help you to review and assess your organization’s status and state of security? Fi
    6·1 answer
  • Celeste is writing a paper. However, two pages in, her computer shuts down unexpectedly. She never saved her paper, and all her
    12·2 answers
  • ​Client/server computing is​ a: A. network that connects sensors to desktop computers. B. distributed computing model where clie
    12·1 answer
  • HI How are you anyways are any of you intreseted in my giveaway
    7·2 answers
  • Describe psychographic differences among the past five generations of Americans that you learned about in this course. What type
    6·1 answer
  • If anyone knows how to code on python:
    8·1 answer
  • in a small town, there are two providers of broadband internet access: a cable company and the phone company. the internet acces
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!