1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Akimi4 [234]
3 years ago
15

Read the problem listed below. Formulate a Decomposition or Outline of the problem. Determine if you have seen this problem befo

re and how it was solved. Start to write your Algorithm, making note of the inputs and outputs that will be required. Write your code, test and debug.
Problem:
Create a program in Python that will draw a series of triangles. The program needs to ask the user for the number of triangles to draw and the size of the triangle.

The inputs for this program need to look like the following:

Enter the number of triangles:
Enter the size of the triangles:
Using these two inputs, your program will then draw a series of triangles in the size the user wishes.

For example if the user enters 3 triangles with a size of 5, the following will be the output:

*
**
***
****

*
**
***
****

*
**
***
****
The easiest way to solve this problem is with two loops. One loop draws the triangles and the other repeats the drawing.

When testing your program make sure you test with different sizes and different numbers of triangles as this will be how your code will be run by Codio.
Computers and Technology
1 answer:
SashulF [63]3 years ago
7 0

URL where the media can be found;

the description of the type of media used in the example;

an analysis of the media piece in relation to the best practices discussed in this lesson, which answers these questions:

Does the piece illustrate best practices?

Which are best represented?

What point do you feel the company

You might be interested in
Typically, when an organization purchases Internet access from an Internet Service Provider (ISP), the ISP will grant it
Radda [10]

Answer:

(B) A single public IP address that it can use for NAT

Explanation:

Because the IPV4 IP protocol is still used today, the number of available IP addresses is limited (only 4,294,967,296 addresses in the world), for this reason, the most correct practice is the assignment of a single public IP to those companies that acquire services from an ISP, with some few exceptional cases of companies that own several.

So that the company's addressing can be executed successfully, the use of NATs is enabled, this allows the translation of network addresses, allowing the company to have as many private networks as necessary and that these can be communicated Correctly with the global network, the Internet, through the public IP of the company.

4 0
4 years ago
We want to implement a data link control protocol on a channel that has limited bandwidth and high error rate. On the other hand
Korolek [52]

Answer:

Selective Repeat protocols

Explanation:

It is better to make use of the selective repeat protocol here. From what we have here, there is a high error rate on this channel.

If we had implemented Go back N protocol, the whole N packets would be retransmitted. Much bandwidth would be needed here.

But we are told that bandwidth is limited. So if packet get lost when we implement selective protocol, we would only need less bandwidth since we would retransmit only this packet.

6 0
3 years ago
What is the bleed space in a design?
pav-90 [236]

Answer:

The bleed is the part on the side of a document that gives the printer a small amount of space to account for movement of the paper, and design inconsistencies. Artwork and background colors often extend into the bleed area. After trimming, the bleed ensures that no unprinted edges occur in the final trimmed document.

Explanation:

8 0
3 years ago
A red wavy line under a word means _____.
zhenek [66]
The third option is correct.
3 0
3 years ago
Read 2 more answers
Who is Carl Thompson?
pishuonlain [190]
Carl Thompson was a well know Jazz player back in the mid 1900s
7 0
3 years ago
Other questions:
  • Which type of wireless network is<br> controlled through a wireless<br> access point?
    7·1 answer
  • Suppose you have a primary location in New York City where you main corporate servers are located. Just in case something happen
    5·1 answer
  • Jim wants to buy a car, but he’ll probably only need it for a couple of years. He has a short commute to work, so he won’t be pu
    5·1 answer
  • In addition to librarians, what other type of worker would you expect to find employed in a school or library
    10·2 answers
  • How many bytes are there in 256 Kbytes?
    6·1 answer
  • Files and folders in UNIX can be removed using the
    8·1 answer
  • (25 POINTS) Some applications work on all devices while others work on some devices. True or False?
    13·1 answer
  • On tool hackers use to get sensitive information from victims is/are:
    15·2 answers
  • Why crt and plasma are not used in laptop ?​
    14·1 answer
  • Which element of the MakeCode Arcade interface represents an individual
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!