1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
barxatty [35]
2 years ago
14

Loren Truesdale

Computers and Technology
1 answer:
LuckyWell [14K]2 years ago
7 0

The output printed by the code is 18

<h3>The Code Analysis</h3>

The flow of the program is as follows:

  • The first line initializes a list of numbers named values
  • The second line initializes fred to 0
  • The third line is an iteration that is repeated for all numbers in the list
  • The next statement is a conditional statement that ensures that all 9's in the list are added, and saved in fred

<h3>The Code Computation</h3>

Recall that, the initial value of fred is 0, and there are 2 9's in the list.

So, the computation is:

fred=0 + 9 + 9

fred=18

This means that, the last instruction on line 10 will display 18, as the output

Hence, the output printed by the code is 18

Read more about algorithms at:

brainly.com/question/11623795

You might be interested in
Ok so another weird question! So if you know what google drive is and how to upload a video why does it keep adding hours! it ke
lesya [120]

Answer:Your video may be too long and you may not have that much storage left.

Explanation:

5 0
3 years ago
What is the real meaning of hack and crack?
vovangra [49]
Hack means hack computer and crack means I guess your behind
7 0
3 years ago
Which of the following could occur when both strong and weak ciphers are configured on a VPN concentrator? (Select TWO) A. An at
Elza [17]

Answer:

A. An attacker could potentially perform a downgrade attack.

E. The IPSec payload reverted to 16-bit sequence numbers.

Explanation:

When both strong and weak ciphers are configured on a VPN concentrator, the following are likely to occur;

An attacker could potentially perform a downgrade attack

The IPSec payload reverted to 16-bit sequence numbers

3 0
3 years ago
Correct or False, when formatting conditional data, I start by selecting the range of data that I want to format
Arturiano [62]

Answer:

Correct

Explanation:

4 0
3 years ago
A design tool helps you plan, evaluate, and explain your ideas to create a product. Some examples of design tools are outlines,
Leni [432]
I might be true and might not which chances are 50%
8 0
3 years ago
Other questions:
  • A technician is tasked to implement a wireless router that will have the fastest data transfer speed at 5 GHz frequency. Which o
    11·1 answer
  • 7.14 LAB: Word frequencies Write a program that reads a list of words. Then, the program outputs those words and their frequenci
    10·1 answer
  • Computer maker Dell realized the problems with keeping large inventories, especially because of the fast rate of obsolescence of
    7·1 answer
  • Dit View
    5·2 answers
  • Draw a circuit with a 12-volt battery, a 100 ohms resistor in series, and two resistors (each of value 200 ohms) in parallel. Wh
    9·1 answer
  • What type of program is Microsoft® Excel®?
    9·2 answers
  • WAFL (write-anywhere file layout) Select one: a. is a distributed file system b. is a file system dedicated to single user opera
    6·1 answer
  • What is meant by reflection?​
    9·2 answers
  • How to edit slides into video.
    13·1 answer
  • How to resize an image in photoshop without losing quality.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!