1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zavuch27 [327]
3 years ago
12

Given a number n, for each integer i in the range from 1 to n inclusive, print one value per line as follows:

Computers and Technology
1 answer:
monitta3 years ago
3 0

The program is an illustration of loops and conditional statements

<h3>Loops</h3>

Loops are used to perform repetitive operations

<h3>Conditional statements</h3>

Conditional statements are statements that are used to make decisions, depending on their truth values

<h3>Python program</h3>

The program written in Python where comments are used to explain each line is as follows:

#This gets input for n

n = int(input())

#This iterates through n

for i in range(1,n+1):

   #If the current number is not a multiple of 3 and 5

   if not(i%3 == 0 or i%5==0):

       #This prints the number

       print(i,end="")

   else:

       #This prints "Fizz", if the current number is a multiple of 3

       if i%3 == 0:

           print("Fizz",end="")

       #This prints "Buzz", if the current number is a multiple of 5

       if i%5==0:

           print("Buzz",end="")

   #This prints a new line

   print()

Read more about loops and conditional statements at:

brainly.com/question/26098908

You might be interested in
NO LINKS OR SPAMS THEY WILL BE REPORTD<br><br> Click here for 50 points
storchak [24]

Answer:

I clicked bro

Explanation:

What now?

7 0
3 years ago
Read 2 more answers
Data ________ is important because it establishes an organization's rules for sharing, disseminating, acquiring, standardizing,
photoshop1234 [79]

Data protection policy is important because it establishes an organization's rules for acquiring, standardizing and disseminating data.

<h3>What is Data protection policy?</h3>

These are policies adopted by organizations that help to ensure data is adequately protected.

When data isn't protected , it could get to the hands of criminals which could use it for different types of cybercrime and also to ensure compliance with data protection laws in the country.

Read more about Data protection policy here brainly.com/question/26493645

3 0
2 years ago
What’s some insider knowledge that only people in your line of work have?
ZanzabumX [31]
We can read things like this 3elô m7 n&m3
4 0
3 years ago
Read 2 more answers
You are configuring a wireless network with two wireless access points. Both access points connect to the same wired network. Yo
-BARSIC- [3]

Answer:

b. Same SSID, different channel

Explanation:

The Service Set Identifier (SSID) is a sequence that is included in all of the sets in a wirless network and helps identify them as part of the network. Because both points connec to the same network they need the same SSID.

7 0
3 years ago
PowerPoint displays a few themes that are similar to one another.
Naya [18.7K]
"Powerpoint displays a few themes that are similar to one another", this statement is true. Sometimes, the theme is accompanied of pictures and graphics which are also similar to one another. This theme represents the document that you want to present and submit. Sometimes also, the theme represents the personality of the creator.
3 0
3 years ago
Read 2 more answers
Other questions:
  • What is the name of small programs stored on the hard drive that tell the computer how to communicate with a specific hardware d
    5·1 answer
  • What are some programs that you have used that have condition-controlled loops and count-controlled loops?
    10·1 answer
  • If you can log into a website to add, edit, or delete content that has been added by you or another user, you are most likely us
    6·1 answer
  • Which of the following represents the TCP/IP four-layer reference model? Group of answer choices Application, Internet, transpor
    11·1 answer
  • How do u make a bored builder
    8·2 answers
  • How is cropping different from scaling?​
    11·1 answer
  • I need them on this question
    5·1 answer
  • Analyze the code and identity the value of variable a,b and c after the code execution. int a=40, b=50, c=60; if(! (a&gt;=40)) b
    15·1 answer
  • PLZ PLZ PLZ PLZ HELP will mark brainlist What component contains the ROM (Read Only Memory)?
    5·1 answer
  • If consumers start to believe they need a product, what is likely to happen
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!