1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olasank [31]
3 years ago
9

What is output? Select all that apply. c = 0 while (c < 5): c = c + 1 print(c) 6 5 2 4 3 0 1

Computers and Technology
1 answer:
777dan777 [17]3 years ago
8 0

Answer:

2 4 3 0 1

Explanation:

You might be interested in
What are two factors that cause technology to progress
NISA [10]
An unsolved problem that needs a solution, and the discovering of a more efficient system / product / element that reveloutionizes the market and changes how people do things.
8 0
3 years ago
Read 2 more answers
Freeeeeeee brainliest!!!
kondaur [170]

Answer:

Oh Thanks :)

Explanation:

7 0
3 years ago
PythonFunction Name: doublesParameters: list of int Returns: list of intDescription: Write a function, doubles, that takes a lis
lawyer [7]

Answer:

def doubles(ls):

   new = []

   for i in ls:

       for a in ls:

           if (i == a*2) and (i not in new) and i != 0:

               new.append(i)

               break

   return new

   

ls = [3, 0, 1, 2, 3, 6, 2, 4, 5, 6, 5]

print(doubles(ls))

Explanation:

The code is written in python.

The function doubles is created and it has one parameter.

In the function, a new list is created to hold the values that are exactly twice the previous integer in the list.

Two nested for loops are used with an if statement to achieve the desired result. The first FOR loop gets a number from the list entered by the user and holds that number while it waits for the second for loop and the if statement. The second FOR loop, iterates through all the elements in the list and compares them with the number being held by the first for loop through the IF statement.

The IF statement checks 3 things:

  • if the first number is x2 the second
  • if it is not already contained in the list
  • if the number is not zero

All these conditions must pass as True before the number is appended to the new list.

The break statement is there to ensure that the loop does not start evaluating unnecessary conditions, so when a match is found for one element the second loop breaks thereby allowing the first FOR loop to move to the next number.

Finally, the new list is returned and the function is called.

I have attached a picture of the result.

4 0
4 years ago
Howard is leading a project to commission a new information system that will be used by a federal government agency. He is worki
Ann [662]

Answer:

The correct answer is A.

Explanation:

Given the example in the question, Howard is at the step of implementing security controls.

There are five official steps for the risk management framework.

  1. Categorizing The Information System: In this step, the IT system's objectives are assigned based on the current mission or project.
  2. Selecting Security Controls: After the risk assesment is done, the security controls for technical, hardware and software problems are decided according to the outcome.
  3. Implementing Security Controls: In this step, the points that were decided in the step before are put into action.
  4. Authorizing The Information System: Authorization for the risk management is approved and monitored.
  5. Monitoring Security Controls: The authorities keep monitoring the process and makes any necessary changes and updates.

The process that is explained in the question is step 3, which is given in option A.

I hope this answer helps.

5 0
3 years ago
Which tab houses the Themes tool?<br><br> Home<br> Insert<br> Page Layout<br> View
Nataliya [291]

Answer:

Page Layout tab

Explanation:

PLS MARK AS BRAINLIST

3 0
3 years ago
Read 2 more answers
Other questions:
  • Under the ____________________, federal agencies must 1) review their IT systems for privacy risks, 2) post privacy policies on
    12·1 answer
  • Recursion is memory-intensive because ________. Select one: a. it requires large data values b. it must occur numerous times bef
    11·1 answer
  • You are writing an email to a potentional employer about a job opportunity. What can you do to make sure the email reflects your
    15·2 answers
  • ) write a program that creates a vector of string called "vec". vector "vec" grows and shrinks as the user processes the transac
    6·1 answer
  • PLZZZ HELP ME THIS IS THE THIRD TIME!!! BRAINLIEST AND 50 POINTS What are the advantages and disadvantages of top-down and botto
    9·1 answer
  • What pattern is a heart-shaped pattern that captures sound from a single direction, ?from the front?
    5·1 answer
  • What is the Keyboard shortcut to change the case of selected text?
    6·1 answer
  • Which expression is equivalent to 3x + 3x + 3x?<br><br> From Performance Matters
    11·2 answers
  • Alyson would like to see a list of all of the applications installed on her computer. What is the easiest way for her to do this
    8·1 answer
  • Cyberstalking is an example of a:
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!