1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rom4ik [11]
3 years ago
10

in python i wrote a function where if the user inputs a certain word the function repeats over again, since the function aaks fo

r the word the end of the function, therotically the function can repeat infinte times. Now my question is, how can i find out how many times the function was repeated. i need to know how many times the function repeated in order to do a percentage calculation, can someone tell me, how i can find how many times the function was repeated ?
Computers and Technology
1 answer:
Colt1911 [192]3 years ago
4 0
Check out the counter set
You might be interested in
Determine if x(t) is periodic and determine the fundamental period.
Studentka2010 [4]

Answer:

hdiihgguilmjj jduhuiuedoibb

6 0
4 years ago
Francis has designed a picture book appropriate for third graders. He wants teachers across the world to freely download use, an
mestny [16]

Answer:

The correct answer will be "Project Gutenberg".

Explanation:

  • Project Gutenberg continues to obtain lots of requests for authorization for using printed books, pictures, as well as derivatives from eBooks. Perhaps some applications should not be produced, because authorization would be included in the objects provided (as well as for professional usages).
  • You can copy, hand it over, or m actually-use it underneath the provisions including its license that was included in the ebook.

So that the above is the right answer.

8 0
3 years ago
เเปลภาษานิราศภูเขาทอง
Marianna [84]
Type it up in English
4 0
3 years ago
_______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the
julia-pushkina [17]

Answer:

Option (A) is the correct answer.

Explanation:

A Computer system can be the target for the crime on which a criminal can acquire the information from the computer system which is stored on it. A Criminal is targeting the system with the help of some software that is entered on the computer system through a network.

In the above question, paragraphs are describing the content related to the crime which targets the computer system. This is a concept of a "computer as target". Hence option "A" is the correct answer while the other is not valid because--

  • Option b suggests the concept behind the storage device of a computer but in the question, it is about the crime of a computer.
  • Option c suggests the concept behind the computer is a criminal but in the question, it is about the crime of a computer.
  • Option d suggests the concept behind the communication of a computer but in the question, it is about the crime of a computer.
4 0
4 years ago
What sequence would a user need to follow to change Chart A into Chart B?
alexandr402 [8]

Either options C or D

You can change the chart type of the whole chart or for single data series in most 2-D charts to give the chart a different look. In 3D or bubble charts, you can only change the chart type of the whole chart. By following the steps in the answers above, you will be in a position to select available chart type like column chart or line chart.

3 0
3 years ago
Other questions:
  • 5) How have the wireless web and peer-to-peer networking helped small businesses compete with large corporations?
    15·2 answers
  • How can I get more Gems in the game {Fashion Empire} through a Fire kindle?
    15·2 answers
  • A computer professional who has access to sensitive information shares this information with a third party. Which professional c
    9·2 answers
  • What is the lowest layer of the osi model at which wired and wireless transmissions share the same protocols?
    11·1 answer
  • What will be displayed after the following statements execute? int funny = 7, serious = 15; funny = serious 2; if (funny != 1) f
    7·2 answers
  • What is the protocol developed for the wireless network communications? explain?
    8·1 answer
  • The length property of the String object returns
    15·1 answer
  • You are to write a program name matrix.java that multiplies two matrices. 1. Your program should prompt the user for the dimensi
    5·1 answer
  • A new PKI is being built at a company, but the network administrator has concerns about spikes of traffic occurring twice a day
    5·1 answer
  • What are the common uses of joysticks? ​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!