1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Veronika [31]
2 years ago
13

Make and run a Python program which:

Computers and Technology
1 answer:
PSYCHO15rus [73]2 years ago
6 0

Answer:

ok

Explanation:

You might be interested in
Write a program that prompts the user to enter two positive integers less than 1,000,000,000 and the program outputs the sum of
alexira [117]

Answer:

In Python:

low = int(input("Low: "))

high = int(input("High: "))

if low >= 1000000000 or high >=1000000000:

   print("Out of range")

else:

   mylist = []

   for num in range(low,high+1):

       flag = False

       if num > 1:

           for i in range(2, num):

               if (num % i) == 0:

                   flag = True

                   break

       if not flag:

           mylist.append(num)

           print(num, end = " ")

   print()

   print("The twin primes are: ",end="")

   count = 0

   for i in range(1,len(mylist)):

       if mylist[i] - mylist[i-1] == 2:

           print(str(mylist[i])+" & "+str(mylist[i-1]),end=", ")

           count+=1

   print()

   print("There are "+str(count)+" twin primes")

Explanation:

See attachment for complete program where comments were used to explain each line

Download txt
7 0
2 years ago
A developer wants to take existing code written by another person and add some features specific to their needs. Which of the fo
anzhelika [568]

Answer:

open-source

Explanation:

open-souce software allows any user to submit modifications of the source code

7 0
2 years ago
You have important data on your hard drive that is not backed up and your Windows installation is so corrupted you know that you
Solnce55 [7]

Answer:

b.Make every attempt to recover the data

Explanation:

If you have important data on your hard drive that is not backed up and your Windows installation is so corrupted you know that you must refresh the entire installation you should  make every attempt to recover the data.

4 0
3 years ago
PLEASE HELP!!! 18 points
sdas [7]

Answer:

Vertigo                                            |     1958 |      128 | English         | 1958-08-24 | UK

   902 | The Innocents                                      |     1961 |      100 | English         | 1962-02-19 | SW

   903 | Lawrence of Arabia                                 |     1962 |      216 | English         | 1962-12-11 | UK

   904 | The Deer Hunter                                    |     1978 |      183 | English         | 1979-03-08 | UK

   905 | Amadeus                                            |     1984 |      160 | English         | 1985-01-07 | UK

   906 | Blade Runner                                       |     1982 |      117 | English         | 1982-09-09 | UK

   907 | Eyes Wide Shut                                     |     1999 |      159 | English         |            | UK

   908 | The Usual Suspects                                 |     1995 |      106 | English         | 1995-08-25 | UK

   909 | Chinatown                                          |     1974 |      130 | English         | 1974-08-09 | UK

   910 | Boogie Nights                                      |     1997 |      155 | English         | 1998-02-16 | UK

   911 | Annie Hall                                         |     1977 |       93 | English         | 1977-04-20 | USA

   912 | Princess Mononoke                                  |     1997 |      134 | Japanese        | 2001-10-19 | UK

   913 | The Shawshank Redemption                           |     1994 |      142 | English         | 1995-02-17 | UK

   914 | American Beauty                                    |     1999 |      122 | English         |            | UK

   915 | Titanic                                            |     1997 |      194 | English         | 1998-01-23 | UK

   916 | Good Will Hunting                                  |     1997 |      126 | English         | 1998-06-03 | UK

   917 | Deliverance                                        |     1972 |      109 | English         | 1982-10-05 | UK

   918 | Trainspotting                                      |     1996 |       94 | English         | 1996-02-23 | UK

   919 | The Prestige                                       |     2006 |      130 | English         | 2006-11-10 | UK

   920 | Donnie Darko                                       |     2001 |      113 | English         |            | UK

   921 | Slumdog Millionaire                                |     2008 |      120 | English         | 2009-01-09 | UK

   922 | Aliens                                             |     1986 |      137 | English         | 1986-08-29 | UK

   923 | Beyond the Sea                                     |     2004 |      118 | English         | 2004-11-26 | UK

   924 | Avatar                                             |     2009 |      162 | English         | 2009-12-17 | UK

   926 | Seven Samurai                                      |     1954 |      207 | Japanese        | 1954-04-26 | JP

   927 | Spirited Away                                      |     2001 |      125 | Japanese        | 2003-09-12 | UK

   928 | Back to the Future                                 |     1985 |      116 | English         | 1985-12-04 | UK

   925 | Braveheart        

Explanation:

hope this helped please mark me branliest let me know if you have questions :)

5 0
3 years ago
A network utilizes a network access control (NAC) solution to protect against malware. When a wired or wireless host tries to co
Inessa [10]

Answer: Posture assessment

Explanation:

Posture assessment, also refers to posture validation and it is when somw set of rules are applied to the posture data which then gives an assessment of the trust level which can be placed in th e endpoint.

Posture assessment has to do with how the system security is evaluated based on the applications and the settings.

3 0
3 years ago
Other questions:
  • What is the chief ethical concern concerning all the new sources of data available through new technological means like internet
    9·1 answer
  • What are the meaning master files<br>​
    8·1 answer
  • Which of these statements describes the difference between binary and decimal numbers?
    11·2 answers
  • You install a teanviewer on your work station at home so that you can access it when on the road. How can you be assured that un
    12·1 answer
  • 1. Consider a direct-mapped cache that can accommodate 8Mbytes from a main memory, that uses a 32-bit address and 32-byte blocks
    5·1 answer
  • How do you change the top and bottom margins of an entire document?
    7·2 answers
  • Jerry wants to save his company money. He decides to move to open source software for his word processing needs. Jerry then down
    5·1 answer
  • Describe three perimeter intrusion detection systems and give an example of one that you have seen deployed either at work or an
    8·1 answer
  • When installing EMT conduit that will be exposed to wet conditions, _______ fittings should be used.
    5·2 answers
  • Which package is required for shadow passwords to be enabled?.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!