1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Xelga [282]
3 years ago
14

Write the code in python to ask the user to input two integers. Your program will then print the greatest common divisor of the

two integers. Look at the math module for a function that will help you find the greatest common divisor.
Computers and Technology
1 answer:
Hunter-Best [27]3 years ago
3 0

import math

num1 = int(input("Enter a number: "))

num2 = int(input("Enter a number: "))

print(math.gcd(num1, num2))

The gcd() - greatest common divisor function, which is part of the math module works perfectly in this situation.

You might be interested in
Consider a system that uses a 32-bit unique salt where users have a 4-digit number as a password (e.g. 6813). Eve wants to crack
Alenkasestr [34]

Answer:

18000 seconds or 300 minutes.

Explanation:

In the example given in the question, it is stated that the system uses 32-bit unique salt which is equal to 4 bytes where every digit takes up 1 byte thus forming the 4 digit passwords.

Considering that the passwords are 4 digits, starting from 1000 and up to 9999, there are 9000 possible password combinations.

If Eve has to go through the whole range of possible password combinations and it takes her 1 second to guess 1 password. Then in the worst case scenario, it would take her 18000 seconds or 300 minutes to crack both accounts, assuming that it is possible for them to use the same passwords.

I hope this answer helps.

6 0
3 years ago
Read 2 more answers
You run an automobile selling company that has a popular online store on AWS. The application sits behind an Auto Scaling group
vredina [299]

Answer:

We can achieve this by using cURL command and GET command.

Explanation:

<u>cURL command: </u>

  • cURL command is the command of the command line tools which are available on the following platforms such as Linux, Windows, Mac OS, and many other Operating Systems.
  • From the servers, cURL transfer the following data by using any of the protocol which are supported such as SFTP, HTTPS, HTTP, FTPS or many of the other protocols.

<u> </u>

<u>GET command: </u>

GET command is the function by which from the particular URL we can retrieve the resources.

8 0
3 years ago
Until 2015, each new Roblox user automatically had one friend. What was he called?
RUDIKE [14]

Until 2015, each new Roblox user automatically had one friend and the friend was called Builderman

Builderman is the friend that is provided automatically for all users until 2015

<h2>Further Explanation</h2>

The builderman welcomes each new Roblox user, send a message to them and automatically follows every user until when it was discontinued in 2014. The role of the Builderman was to introduce the game experience to each new Roblox user.

Roblox is an online game and serves as a platform where users can also create their own games. Roblox gives its users the platform to design their own games and allow its user to different kinds of games that are created by other users on the platform

Roblox hosts numerous games designed by its users and virtual worlds which covers different genres, such as traditional racing, obstacle courses and many more.

Roblox has millions of users worldwide, its monthly active users are over 100million. Roblox also allows its users to create virtual items for sale. This also implies, its users can create virtual items and sell them for other users

Roblox was founded by David Baszucki and Erik Cassel; it was released on September 1, 2006. It is a platform that allows single-player and multiplayer.

LEARN MORE:

  • Until 2015, each new Roblox user automatically had one friend. What was he called?  brainly.com/question/12694552
  • What is the programming language of Roblox called?  brainly.com/question/13166316

KEYWORDS:

  • roblox
  • builderman
  • friend
  • message
  • automatically
  • david baszucki
  • erik cassel
6 0
3 years ago
Read 2 more answers
A security administrator is reviewing the following information from a file that was found on a compromised host: Which of the f
Roman55 [17]

Answer:

C. Trojan

Explanation:

In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.

This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.

In this scenario, a security administrator is reviewing the following information from a file that was found on a compromised host: "cat suspiciousfile.txt."

Some of the ways to prevent vulnerability in a network are;

1. Ensure you use a very strong password with complexity through the use of alphanumerics.

2. You should use a two-way authentication service.

3. You should use encrypting software applications or services.

8 0
3 years ago
When you think of computers, I want you to think:
jekas [21]

Answer:

Explanation:

When I think about computers, I can understand about the software and the hardware, we can touch the hardware, but the software don't because is only data stored in the hardware, we can interact with the stored data using the hardware, we can complete a system with data, software, hardware, and people, people try to learn about software because it is better paid than fix a hardware.

5 0
3 years ago
Other questions:
  • A rectangular range of cells with headings to describe the cells' contents is referred to as a
    9·1 answer
  • Optimally, the __________ guides investment decisions and decisions on how ISs will be developed, acquired, and/or implemented.
    6·1 answer
  • One of the disadvantages of an e-marketplace is that it cannot provide a single platform for prices. true or false?
    10·2 answers
  • Write a Python 3 script in PyCharm that will simulate the game of "Rock, Paper, Scissors": Display a header and the simple rules
    8·1 answer
  • Which element would the search element be compared to first, if abinary search were used on the list above?
    6·1 answer
  • Random Access Memory is tempory computer memory that stores works in progress
    7·1 answer
  • Write an enhanced for loop that multiplies all elements in an int[] array named factors, accumulating the result in a variable n
    11·1 answer
  • Select the correct answer from each drop-down menu.
    5·2 answers
  • he wants to customize the operating system to meet his needs. what types of tools should he use, and what can he do with each?
    6·1 answer
  • What is the difference between algorithm and program?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!