1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kvv77 [185]
3 years ago
10

Write a program that keeps asking the user for new values to be added to a list until the user enters 'exit' ('exit' should NOT

be added to the list). These values entered by the user are added to a list we call 'initial_list'. Then write a function that takes this initial_list as input and returns another list with 3 copies of every value in the initial_list. Finally, inside main(), print out all of the values in the new list.
Computers and Technology
1 answer:
Free_Kalibri [48]3 years ago
5 0

Answer:

def create_3_copies(initial_list):

   another_list = []

   

   for i in range(3):

       for x in initial_list:

           another_list.append(x)

   return another_list

   

initial_list = []

while True:

   value = input("Enter a value: ")

   if value == "exit":

       break

       

   initial_list.append(value)

for x in create_3_copies(initial_list):

    print(x, end=" ")

Explanation:

Create a function that takes initial_list as parameter. Inside the function:

Create an empty list called another_list

Create a nested for loop. The outer loop iterates 3 times (Since we need to add every value 3 times). The inner loop iterates through the another_list and adds each value to the another_list.

When the loops are done, return the another_list

In the main:

Create an empty list named initial_list

Create an indefinite while loop. Inside the loop, ask the user to enter a value. If the value equals "exit", stop the loop. Otherwise, add the value to the initial_list

Create another for loop that calls the function we created passing the initial list as a parameter and iterates through the values that it returns. Inside the loop, print each value

You might be interested in
Explain the working system of a computer with an example.​
Phoenix [80]

Answer:

A computer system works by combining input, storage space, processing, and output. ... For example, when we type something using a keyboard, it is known as an Input provided to the Computer. Storage Space: It is the place where our input gets stored. It is known as Computer Memory that keeps the data into it.

hope. It helps

can you mark. Me as brinelist

8 0
3 years ago
Which of the following is considered a skill?
faltersainse [42]
I’m not sure what are the following answers but some skills are communication, problem solving, creativity and teamwork
7 0
4 years ago
Describe the two alternative for specifying structural constraints on relationships types?
AysviL [449]

Answer:

They are the cardinality ratio and participation constraints.

Explanation:

The Cardinality Ratio: This is for the binary relationship that specifies the max number of instances of relationships in which an entry can take part in. As an example, the Student Of binary relationship form, School: Student, the cardinality ratio of this is 1: N. and that means each of the schools can be mapped to any number of students, however, one student can be mapped to only one school. And various possible cardinality ratios for various types of binary relationships can be 1: N, N:1, 1:1, and M: N.

Participation constraint: This stipulates that an entity being be contingent upon another entity through relationship form. And it stipulates the least figure of instances of relationship which each of the entity can indulge in, and is often termed as least cardinality constraint. And we have participation types: partial and total.

4 0
3 years ago
Howard is leading a project to commission a new information system that will be used by a federal government agency. He is worki
Ann [662]

Answer:

The correct answer is A.

Explanation:

Given the example in the question, Howard is at the step of implementing security controls.

There are five official steps for the risk management framework.

  1. Categorizing The Information System: In this step, the IT system's objectives are assigned based on the current mission or project.
  2. Selecting Security Controls: After the risk assesment is done, the security controls for technical, hardware and software problems are decided according to the outcome.
  3. Implementing Security Controls: In this step, the points that were decided in the step before are put into action.
  4. Authorizing The Information System: Authorization for the risk management is approved and monitored.
  5. Monitoring Security Controls: The authorities keep monitoring the process and makes any necessary changes and updates.

The process that is explained in the question is step 3, which is given in option A.

I hope this answer helps.

5 0
3 years ago
Explain why there is an overlap of skills and qualities in design professions​
strojnjashka [21]

The design process is the same in all creative occupations, thus, similar skills and qualities are required. The work of an architect, Craftperson, Fine Artist, or an Interior designer is to design. Whether one occupation designs clothing and associated fashions or another one designs interiors of building, they all design. Most people who work as designers possess similar personal qualities like creativity, better communication skills, and high skill set.

6 0
3 years ago
Other questions:
  • Write one DDL statement to add a new table Project into exam1. It contains the followingthree columns:-ProjNum of char(3) type,
    15·1 answer
  • Which option can Jesse use to customize her company’s logo, name, address, and similar details in all her business documents?
    6·1 answer
  • What device makes it possible for multiple customers to share one address
    11·1 answer
  • 15. The most efficient way to perform data entry is to keep your hands on the keyboard and press _______ to move to the next cel
    13·1 answer
  • Tower of Hanoi algorithm 4 disks
    12·2 answers
  • 7.4 Code Practice: Question 2
    13·1 answer
  • What is meant by astigmation​
    9·2 answers
  • PLS HELP ASAP) Omar is using the web to do research on diabetes. he needs to ensure that all of the information he finds regardi
    7·1 answer
  • Your development server is experiencing heavy load conditions. Upon investigating, you discover a single program using PID 9563
    5·1 answer
  • Samantha wants to begin searching for a job using the Web. The best source for her online search will probably be __________.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!