1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ahrayia [7]
3 years ago
11

To iterate through (access all the entries of) a two-dimensional arrays you

Computers and Technology
1 answer:
ahrayia [7]3 years ago
6 0

Answer: You would need two loops to iterate through both dimensions

Explanation:

matrix = [[1,2,3,4,5],

              [6,7,8,9,10],

              [11,12,13,14,15]]

for rows in matrix:

    for numbers in rows:

         print(numbers)

The first loop cycles through all the immediate subjects in it, which are the three lists. The second loop calls the for loop variable and iterates through each individual subject because they are lists. So the first loop iterates through the 1st dimension (the lists) and the seconds loop iterates through the 2nd dimension (the numbers in the lists).

You might be interested in
Use the drop-down menus to complete the statements about using section breaks in a document
krok68 [10]

Answer:

layout, next page, continuous

Explanation:

just took it

7 0
3 years ago
Microsoft word's spell checker
natka813 [3]
A, will also check word usage
7 0
3 years ago
Read 2 more answers
The advent of mobile systems run by Android and other operating systems opens a wide range of new system management and security
sergeinik [125]

Answer:

bring your own devices

Explanation:

"bring your own devices" paradigm is getting popular since organizations are increasingly allowing users to perform work tasks <em>on their own</em> personal devices, It is preferred because of the benefits and ease for the user. On the other hand, this paradigm opens several security risks.

For example processing sensitive data on personal devices creates risks in case of data recovery or if the device is stolen or lost.  

Additionally, <em>control and monitoring</em> of organizational data is harder when users allowed to work on their personal devices. Thus <em>data leakage</em> and <em>public exposure</em> can happen more easily.

7 0
3 years ago
Tablets combine the features of which two types of devices?
VikaD [51]
A tablet<span> is a wireless, portable personal computer with a touchscreen interface. The </span>tablet<span> form factor is typically smaller than a notebook computer, but larger than a smartphone.
</span>
5 0
3 years ago
Server virtualization in windows server 2012 r2 is based on a module called the
alexgriva [62]
<span>Server virtualization in windows server 2012 r2 is based on a module called the</span> hypervisor.
3 0
3 years ago
Other questions:
  • Please help
    5·1 answer
  • Write a program that accepts 5 number and arrange them in ascending order​
    7·1 answer
  • Elizabeth works for a local restaurant At the end of her shift, she is required
    15·2 answers
  • To see all of the records at once, you should use _______ view. 
    12·2 answers
  • List and describe the tools for all the main stages of app/application development.
    11·1 answer
  • Which property of a text element controls how the browser handles text that does not fit within the element box?
    13·1 answer
  • What is a Stereo In (&amp; Out) in audio?
    7·1 answer
  • Ian kno da answer tell me
    7·2 answers
  • How many discussion posts must you complete to meet the Expectations of the replies category
    11·1 answer
  • Write an answer in three to five sentences that describes the photo, explains what better lighting would mean for your photograp
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!