1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Radda [10]
2 years ago
13

Write a program that prints the U.S. presidential election years from 1792 to present day, knowing that such elections occur eve

ry 4 years. Hint: Initialize your loop variable to 1792. Don't forget to use
Computers and Technology
1 answer:
Naddika [18.5K]2 years ago
8 0
Year = 1972
current year = 2021

while year <= current year:
print (year)
year = year + 4
You might be interested in
The Solution Explorer window ____.
nataly862011 [7]

Answer:

The correct answer for the given question is option(d).

Explanation:

Solution Explorer is found in Microsoft Visual Studio.When we create a project in the c# or another programming language the solution explorer window is used. The Solution Explorer takes care of the projects and files.  

Solution Explorer displays an overall view of the current project. In the Solution Explorer we can delete or add the file in the project. The  Solution Explorer window displays the list that is contained in the current solution.

  • Option(a),Option(b) and Option(c) are the incorrect option for the Solution Explorer window.
  • So, Option(d) is the correct answer for the solution explorer.
8 0
3 years ago
Which are characteristics of interpreters? Select
SVEN [57.7K]

Answer:

translation is used for interpretation

8 0
3 years ago
Read 2 more answers
Which of the following technologies is the best choice to convey urgent and highly sensitive information? telephone fax letter e
snow_lady [41]
Using e-mail to send messages is the best choice to convey urgent and highly sensitive information. E-mail is just a conversation between you and the recipient. So it is the best when it comes to when you are sending a highly sensitive information. While telephone fax letter and dispatch radio may need to use a mediator to transfer messages which violates the confidentiality of the information.
3 0
3 years ago
Renee just got on the freeway to go to her cousin's house in Denver. She is driving 50 miles per hour. Her sister Kim left one h
defon

let's say they catch-up to each other after t hour.

so

in t hour distance travelled by Renee

d = speed × time = 50t

in t hour distance travelled by Kim

d = speed × time = 60(t-1) + 0×1 = 60(t-1)

Note: here kim didn't covered any distance in first hour and in rest t-1 hour it travelled all distance

now.as distance travelled by both is same so

60(t-1) = 50t

60t -60 = 50t

adding 60 both sides

60t = 50t+60

subtracting 50t both sides

60t -50t = 50t+60 - 50t

10t = 60

dividing by 10 both sides

t = 60/10 = 6

so in 6 hour both will catch-up to each other

3 0
3 years ago
Which of the following, when used in conjunction with hyperlinks, can be useful for easily navigating a Word document? : *
Valentin [98]
Caption is a best answer i hope its work
7 0
3 years ago
Other questions:
  • Which scientific law states that if a light source radiates isotropically, the light intensity falls off the further you get fro
    5·1 answer
  • Identify the four basic categories of hardware in a microcomputer system. system unit, modem, ram, and microprocessor system uni
    5·1 answer
  • You have been asked to create a Community leveraging Out-of-the-box login, logout, self-registration, and error pages. Would you
    5·1 answer
  • What method is used to manage contention-based access on a wireless network?
    7·1 answer
  • What is it called when two different files generate the same hashing result?
    15·1 answer
  • How we know that how many domain exist in window server 2012?
    14·1 answer
  • Which of the following is the answer?
    5·1 answer
  • What is the range for copper tape
    15·1 answer
  • What is the answer 11100+01010​
    8·1 answer
  • k-means clustering cannot be used to perform hierarchical clustering as it requires k (number of clusters) as an input parameter
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!