1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GrogVix [38]
3 years ago
5

Anu wishes to prepare a program to display the value of numbers from 1 to 25. The program that Anu prepared is given below. Ther

e are some errors in it. Can you edit the errors?
s=0
for i in range(25):
s=s+i print(s)
Computers and Technology
2 answers:
sergiy2304 [10]3 years ago
5 0

Answer:

Programming is a set of instructions i.e. Input given by the user to the computer to perform a particular task and give the desired result i.e. output.

Final Answer

‌s=0

for i in range(1,26):

s=s+ i

print(s)

Explanation:

IF THE ANSWER IS CORRECT THEN MARK A BRAINLEST

arlik [135]3 years ago
4 0

\tt s=0

\tt for\: i\:in\:range(25)

\tt p=s+i

\tt print(p)

we are done .

You might be interested in
A UI text element must be added to ______.an empty background container game objecta prefaba slot game objecta tray objecta canv
barxatty [35]

Answer:

canvas

Explanation:

The answer to this question is that A UI text element must be added to a canvas. The canvas is that area that all the unity items (UI) have to be inside.

We insert the Text UI element when we move to the hierarchy of the scene from create we move to UI and then to text.

After all these have been done, we will get a text element which have been added in the Canvas region.

5 0
3 years ago
A occurs when you reset a mobile device but retain your installed applications and personal settings
yaroslaw [1]

Answer:

Soft Reset

Explanation:

A Soft Reset is a type of reset in which a gadget such as smartphones, PC, or other related gadgets undergo to refresh or reset the device or makes certain applications work or function well without user data, settings and applications.

Hence, a SOFT RESET occurs when you reset a mobile device but retain your installed applications and personal settings

3 0
3 years ago
Read 2 more answers
What would be a good hash code for a vehicle identification that is a string of numbers and letters of the form “9x9xx99x9xx9999
Hunter-Best [27]
I also want to ask a question recently i used a software named [url=http://www.videoconverterfactory.com/tips/youtube-to-flac.html]youtube to flac[/url] while after the conversion the size is to big. Why did this happen and how to solve without lose quality?
4 0
3 years ago
A technician is dispatch to troubleshoot a user's computer.
Margarita [4]

Answer:

All of the above.

Explanation:

Thrashing or drive or disk thrashing occurs when the hard drive is stressed with transferring information between the system memory and virtual machine excessively. In thrashing, there is a large number of processes running in the system and the system memory is too small to handle all processes. Thrashing leads to decreased system performance and hard disk failure.

To stop the impact of thrashing, install more RAM, end unimportant progam processes etc.

5 0
3 years ago
In programming, what is a string?
vovikov84 [41]

Answer:

B.

Explanation:

A. is not the correct answer because that is called a LAN cable (ethernet)

C. is not correct because it has nothing to do with text messages or printing

D. is called a Bus, and isn't the right answer either

3 0
3 years ago
Read 2 more answers
Other questions:
  • Students are studying the effects of beach pollution by counting populations of seagulls at two different beach locations. One l
    7·1 answer
  • Differentiate between Software as a service, platform as a service and infrastructure as a service.
    14·1 answer
  • Which of the below statements describes the purpose of HTML 5 - check as many as apply
    9·1 answer
  • 2) Search the Web for two or more sites that discuss the ongoing responsibilities of the security manager. What other components
    15·1 answer
  • Your ___ can provide hardware firewall protection for your home network where it connects to the ISP's network, just as ISP netw
    12·1 answer
  • Which is a benefit of getting information from a government website?
    15·2 answers
  • When a new word processing software program is released, companies that might use it must consider not only the cost of buying i
    13·1 answer
  • Phishing (pronounced fishing) is malware sent through e-mail that looks like a legitimate message from a trusted sender. The goa
    10·2 answers
  • What form of contacts can be shared in Outlook 2016?
    9·2 answers
  • Help me to solve please​
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!