1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nimfa-mama [501]
3 years ago
8

Write a Python program to print the multiplication table of 4​

Computers and Technology
1 answer:
garri49 [273]3 years ago
8 0

Answer:

multiplier = 0

while multiplier <= 12:

   print(f'4 times {multiplier} = ' + str(4 * multiplier))

   multiplier += 1

Explanation:

The multiplier is just a variable

while the variable is equal to or less than 12, the program will print "4 times (multiplier value) = (4 times the multiplier value)"

the multiplier value then is increased each time the while loop is completed(which is 12 times)

And when the multiplier value is equal to 12, the program will stop, hope this helps! A simpler version would just be

multiplier = 0

while multiplier <= 12:

   print(4 * multiplier)

   multiplier += 1

You might be interested in
QlVEQkNjQWdERnpsSnJnVkJIMDVSbWtDK2ttZ1RSQzNEejJESkNhT20raEhqTWR3UFNINnVpaGk3YjhW
Misha Larkins [42]
Sure, it says "Hulk smash on keyboard"
8 0
3 years ago
How to make numbers look like whatever its asking for
emmasim [6.3K]
The third option is your answer.
7 0
3 years ago
When discussing the behavior of vulnerability assessments which choice will exploit a weakness?
yKpoI14uk [10]

Answer:

a) Penetration test

Explanation:

A penetration test, often referred to as a pen test, is part of important process in the development of internet facing service. It is a process of determining if vulnerabilities are actually exploitable in a particular environment.

In other words, it is a process that involves a simulated cyber attack against computer system to check for exploitable vulnerabilities or attempts to actively exploit weaknesses in an environment.

Hence, when discussing the behavior of vulnerability assessments the choice that will exploit a weakness is PENETRATION TEST.

5 0
3 years ago
Which does plug-and-play refer to?
vlabodo [156]
The answer is c the ability for the os to detect
7 0
3 years ago
How can a vpn make use of connection types that include multiple channels, and allow for multilink connections?
horsena [70]

Multilink<u> </u>and Bandwidth Allocation Protocol  can a vpn make use of connection types that include multiple channels, and allow for multilink connections

Bandwidth Allocation Protocol (BAP) generally manages the total number of links in a multilink bundle. It is especially valuable to different operations that usually contain carrier charges based on bandwidth utilization.

<h3>What is bandwidth allocation?</h3>

Bandwidth allocation is the process of assigning radio frequencies to different applications. The radio spectrum is a finite resource, which means there is great need for an effective allocation process.

To learn more about Bandwidth allocation, refer

brainly.com/question/14617183

#SPJ4

4 0
2 years ago
Other questions:
  • Implement the function couple, which takes in two lists and returns a list that contains lists with i-th elements of two sequenc
    8·1 answer
  • "The study of how changes in the input parameters of a linear programming problem affect the optimal solution is known as
    8·1 answer
  • A program is a high-level one that has been converted to machine language
    15·1 answer
  • The work day has just started and you receive reports that the inventory management server is not accessible on your company's n
    7·1 answer
  • Which tab on the ribbon houses the sort functions?<br><br> Insert<br> Data<br> View<br> Home
    11·1 answer
  • An 8x16 font isstored in _________________ bytes.<br> ? 8<br> ? 16<br> ? 4<br> ? 20
    13·1 answer
  • Why is flash memory considered nonvolatile?
    5·1 answer
  • If your computer won't connect to the internet, which of these is most likely to be the problem?
    8·1 answer
  • A new systems development project is Pete’s first experience as a project manager, and he has led his team successfully to the p
    13·1 answer
  • Why does each record need a unique ID number?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!