1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SSSSS [86.1K]
3 years ago
8

EASY QUESTION EASY POINTS!!!!! WILL MARK BRAINLIEST!!!!!

Computers and Technology
1 answer:
TEA [102]3 years ago
5 0

The program is an illustration of loops and conditional statements

<h3>Loops</h3>

Loops are used to perform repetitive operations.

<h3>Conditional statement</h3>

Conditional statements are used to make decisions

<h3>The python program</h3>

The program in Python, where comments are used to explain each line is as follows.

#The following is repeated 5 times; i.e. the rows

for i in range(5):

   #The following is repeated 5 times; i.e. the columns

   for j in range(5):

       #For rows 2 and 5

       if i == 1 or i== 3:

           #For columns 1 and 5

           if j == 0 or j == 4:

               #This prints *

               print('*',end='')

           #For other columns

           else:

               #This prints an empty space

               print('',end=' ')

       #For other rows

       else:

           #This prints *

           print('*',end='')

   #This prints a new line

   print()

Read more about loops at:

brainly.com/question/19344465

You might be interested in
Which term describes an approach to security similar to defense in depth in that it supports multiple layers, but uses a differe
miss Akunina [59]

Answer:

The answer to this question is Diversity of Defense.

Explanation:

Diversity of defense:- It is an approach for security which supports multiple layers but the catch here is that at each layer a different mechanism of security is used or at most of the layers.The idea is that you do not need to have multiple layers of defense but different defenses also.  

So we conclude that the answer to this question is Diversity in Defense.

3 0
3 years ago
Who are the best candidates for members of SkillsUSA? Check all that apply. Adolph wants to be an Elementary School Teacher. Rub
SpyIntel [72]

Answer:

On edge its 3,4,5,6

Explanation:

3 0
4 years ago
Read 2 more answers
____ is another term for document properties.
MArishka [77]
Metadata is the other term for document properties. It is a data that describes another data. The word “meta” means “an underlying definition or description”. Traditionally, it was used in libraries as card catalogs. In digitals, metadata is also used to describe digital data. 
3 0
3 years ago
Employee names are stored using a maximum of 50 characters. This information is an example of which of the following?
enyata [817]

Answer: Data model

Explanation: Data model is the arrangement of the information in the form of table structure to maintain it in the form of database.They help in the keeping the entities in the sequence and can be tracked when required.Example- vendors records,customer record etc.

Other options are incorrect because the data retrieval is the regaining of the data from database, record instance is the parts of the database records  and meta data give knowledge about other data.

8 0
4 years ago
The computers found in DVD players, thermostats, answering machines, and some appliances are known as ____.
Pani-rosa [81]
The computers found in DVD players, thermostats, answering machines, and some appliances are known as embedded computers.
So the answer is <span><span>d. embedded computers</span></span>
5 0
3 years ago
Other questions:
  • What is the basic difference between x.509 and pgp in terms of key hierarchy and key trust?
    12·1 answer
  • You learned about microcomputer a personal computer designed for use by an individual. Perform online research find out the diff
    12·1 answer
  • 4. How does distance affect the strength of the force of gravity?_
    5·1 answer
  • How do you optimize a website using JavaScript?
    10·1 answer
  • Which of the following statements about certificates is true?
    14·2 answers
  • Please help! i need to answer this soon!
    13·1 answer
  • Write a function that parses a binary number into a hex number. The function header is:def binaryToHex(binaryValue)Write a test
    11·1 answer
  • URGENT HELP PLEASE
    13·1 answer
  • What is the address space of a computer with a 64-bit address bus?
    7·1 answer
  • What is the difference between applying risk measures for insurance purposes versus applying risk measures for compliance? Provi
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!