1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Viefleur [7K]
2 years ago
13

Write a program that reads a list of integers, one per line, until an * is read, then outputs those integers in reverse. For sim

plicity in coding output, follow each integer, including the last one, by a comma. Note: Use a while loop to output the integers. DO NOT use reverse() or reversed(). Ex: If the input is:
Computers and Technology
1 answer:
TiliK225 [7]2 years ago
8 0

Answer:

I'm just going to copy my pseudocode into an answer:

x = array()

i = 0

while (true)

j = input()

if j = "*" then break

x[i] = j

i++

print x.join(", ")

Explanation:

You might be interested in
A state university locks in costs for a student once a student starts attending the university. The total cost is $24,500. A stu
zlopas [31]
10,700+5000+1600=17,300
24,500-17,300=7,200
7,200/10=
$720.00 will need to be saved every month.
6 0
3 years ago
Read 2 more answers
Redundancy can be implemented at a number of points throughout the security architecture, such as in ________. Group of answer c
vovikov84 [41]

Group of answer choices.

a. firewalls

b. access controls

c. proxy servers

d. All of the above

Answer:

d. All of the above

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Generally, redundancy to prevent unauthorized access can be implemented at a number of points throughout the security architecture, such as in firewalls, proxy servers and access controls.

A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device.

5 0
3 years ago
JKJKNJJNJJJLKN;K;L;LHNL;BJ
bezimeni [28]

did you have a stroke bestie?

8 0
3 years ago
Read 2 more answers
By what date must federal taxes typically be filed and sent to the IRS?
marishachu [46]
April 15th of each annual year
6 0
3 years ago
Which statement is true? Opinions can be scientifically tested. Scientific theories are absolute and cannot be changed. Scientis
ivolga24 [154]
The one that is correct is the one that says "Facts can be scientifically tested"
6 0
3 years ago
Other questions:
  • A mobile device you are troubleshooting is experiencing a sharp decrease in performance after an hour of operation. The user pow
    9·1 answer
  • You work on the marketing team for a software company. You do not work closely with the development team; however, you need to k
    8·1 answer
  • Solve the recurrence relation.<br> S(1)=1<br> S(n)= S(n-1)+(2n-1) for n&gt;=2
    13·1 answer
  • Leo noticed that attackers have breached his wireless network. They seem to have used a brute-force attack on the WiFi protected
    13·1 answer
  • Plsss help me plsssssss
    11·1 answer
  • Explain the concept of “survival of the fittest”
    15·1 answer
  • !!!!!16 POINTS!!!!Can a computer evaluate an expression to something between true and false? Can you write an expression to deal
    7·1 answer
  • so you just gonna bring me a birthday gift on my birthday to my birthday party on my birthday with a birthday gift
    9·2 answers
  • Advantages of monolithic operating system? ​
    6·1 answer
  • Javier downloads an illustration from an online Image library and modifies it for his purposes. The illustration he downloads is
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!