1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
barxatty [35]
3 years ago
14

Loren Truesdale

Computers and Technology
1 answer:
LuckyWell [14K]3 years ago
7 0

The output printed by the code is 18

<h3>The Code Analysis</h3>

The flow of the program is as follows:

  • The first line initializes a list of numbers named values
  • The second line initializes fred to 0
  • The third line is an iteration that is repeated for all numbers in the list
  • The next statement is a conditional statement that ensures that all 9's in the list are added, and saved in fred

<h3>The Code Computation</h3>

Recall that, the initial value of fred is 0, and there are 2 9's in the list.

So, the computation is:

fred=0 + 9 + 9

fred=18

This means that, the last instruction on line 10 will display 18, as the output

Hence, the output printed by the code is 18

Read more about algorithms at:

brainly.com/question/11623795

You might be interested in
After clicking the Start button on your computer screen desktop, what option would you then select to examine system components
sergejj [24]
I believe it would maybe be B or A , Hope this helps.
8 0
3 years ago
What are the challenges of Cyber Law???? Needed ASAP ​
lilavasa [31]

Answer:

Explanation:

Few challenges that the technology space faces in cyber security are the following:

Digital Data Threat: Growing online transactions generate bigger incentives for cybercriminals. Besides, establishments looking to mine data—for instance, customer information, results of product surveys, and generic market information—create treasured intellectual property that is in itself an attractive target.

Supply Chain Inter-connection: The supply chains are increasingly interconnected. Companies are urging vendors and customers to join their networks. This makes a company’s security wall thin.

Hacking: This action is penetrating into someone’s system in unauthorized fashion to steal or destroy data, which has grown hundred folds in the past few years. The availability of information online makes it easier for even non-technical people to perform hacking.

Phishing: The easiest to execute and can produce the results with very little effort. It is the act of sending out Fake emails, text messages and create websites to look like they're from authentic companies.

6 0
3 years ago
The total revenues for a company are $150,223 and the total expenses were 125,766. If you are calculating the net income, which
krok68 [10]

Answer :

Net income =total revenue - total expenses

Net income =150223-125766

Net income =24457

In spreadsheet :

Total revenue = b2

Total expenses = b3

Net income will write in cell b4

So write formula in b4 to find net income :

=b2-b3

And press enter key to show your answer.

7 0
3 years ago
Assume you are using the text's array-based queue and have just instantiated a queue of capacity 10. You enqueue 5 elements and
Anika [276]

Full question:

Assume you are using the text's array-based queue and have just instantiated a queue of capacity 10. You enqueue 5 elements and then deque 2 elements. Which indices of the internal array elements hold the remaining elements? a) 0 to 2 b) 7 to 9 c) 2 to 4 d) 1 to 3

Answer and Explanation:

If you instantiate a capacity of 10 for the queue, you have the queue a capacity of not more than 10 values.

To enqueue means to add an element to the array(if it's not full, n<10)

To dequeue means to delete an element from the array or queue(if n! =0)

From the question, for example:

We create a queue of capacity 10:

Queue q(10);

We add elements/enqueue 5 elements to the queue :

q.queueEnqueue(10);

q.queueEnqueue(5);

q.queueEnqueue(8);

q.queueEnqueue(9);

q.queueEnqueue(2);

If we print this out:

q. queueDisplay()

We would get:

10, 5, 8, 9, 2

We remove elements/dequeue 2 elements from the queue :

q. queuedequeue();

q. queuedequeue();

We print it out:

q. queueDisplay()

8 ,9, 2

We observe that deletion/dequeue starts from the front/first index.

We are left with indices 2, 3, 4 or 2 to 4

Note: the above methods/ functions and objects used are merely for example purposes. The queue uses a floating front design approach.

7 0
3 years ago
Most email clients contain a ____ that allows the user to read an email message without actually opening it
Stolb23 [73]
Most email clients contain a "subject" that allows the user to read an email message without actually opening it.
4 0
3 years ago
Read 2 more answers
Other questions:
  • An Open Authorization (OAuth) access token would have a _____ that tells what the third party app has access to
    5·1 answer
  • Amy has decided to use a dark background and light colored text for her prensentation. Which toolbar option will let her change
    5·1 answer
  • Semiconductor memory is used mainly for primary storage even with its high cost. In another hand, the magnetic tape is the cheap
    9·2 answers
  • Why should the data in a reservation system that is constantly being updated be stored on a magnetic disk instead of a CD or DVD
    15·1 answer
  • Select the correct answer. What has enabled engineers to design slim and sleek television sets? A. using Nipkow disks B. increas
    7·1 answer
  • Which of the following is NOT one of the modules of a typical Decision Support System (DSS)? Select one: a. Customer information
    14·2 answers
  • Select the antonym for given word freedom
    7·2 answers
  • Which element is represented by the electron configuration in example B? Example B: 1s22s22p63s23p64s1 Aluminum Cesium Potassium
    12·2 answers
  • How to beat level 50 in give up robot 2
    5·1 answer
  • How is data written to a blockchain?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!