1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vlad1618 [11]
3 years ago
12

Coding with Loops Worksheet

Computers and Technology
2 answers:
BartSMP [9]3 years ago
4 0

Answer:

if you give me brainliest i will answer your question

Explan

BlackZzzverrR [31]3 years ago
3 0
Huhhhgtjkkkbbjggffjknn
You might be interested in
Is Flip book drawings, frame by frame (need great drawing skills).
lyudmila [28]
I would say traditional animation
7 0
3 years ago
Given an array of users, write a function, namesAndRoles that returns all of user's names and roles in a string with each value
LenaWriter [7]

Answer:

def namesAndRoles(users):

   for user in users:

       return f"{user[name]}, {user[role]}"

Explanation:

The python program gets the list of dictionaries of the users in a company and returns the user names and their roles. The code is defined as a function and is executed when the function is called.

3 0
3 years ago
Describe the key differences between raster-based and vector-based graphics.
Kazeer [188]

Answer:

asd

Explanation:

8 0
3 years ago
Who coined the term web log for an online journal
astra-53 [7]
Jorn Barger did this
6 0
4 years ago
1. Which of the following is a Windows feature that allows you to temporarily store text?
mamaluj [8]
That feature is called the clipboard. (It can also store other things than text.)
6 0
4 years ago
Read 2 more answers
Other questions:
  • Successful attacks are commonly called ________. a. security incidents b. countermeasures c. both a and b d. neither a nor b
    10·1 answer
  • C. to which cache block will the memory address 0x000063fa map
    14·1 answer
  • What is TRUE about the following array?
    15·1 answer
  • Mobile Device Company (MDC) discovers that defamatory statements about its policies and products are being posted in an online f
    8·1 answer
  • Why do the holes at the top of parachutes make it go slower
    12·1 answer
  • Which state legislation requires companies to report security breaches within 48 hours
    6·1 answer
  • 1. What type of malware is triggered by a specific condition, such as a specific date or a particular user account being disable
    6·1 answer
  • How is modern technology developed? Explain.
    14·2 answers
  • What type of movement does the output produce
    10·1 answer
  • Write a function called printRange() that accepts two integers as arguments and prints the sequence of numbers between the two a
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!