Basic python coding
What is the output of this program? Assume the user enters 2, 5, and 10.
Thanks in advance!
:L

Basic Python CodingWhat Is The Output Of This Program? Assume The User Enters 2, 5, And 10. Thanks In

Answers

Answer 1

Answer:

17.0

Explanation:

after first loop numA = 0.0 + 2 = 2.0

after second loop numA = 2.0 + 5 = 7.0

after third loop numA = 7 + 10 = 17.0


Related Questions

What should you install on an operating system to prevent potentially harmful network packets from entering or leaving the os?

Answers

Answer:

A host-based firewall.

Explanation:

Firewalls monitor incoming and outgoing network traffic, and are either network-based or host-based. As you are trying to protect the OS, a host-based firewall is used as it runs on the host itself, rather than on the network.

A trackerball is a pointing device

Answers

Answer:

nice

Explanation:

Programs that coordinate computer resources, provide an interface, and run application are known as what

Answers

Programs that coordinate computer resources, provide an interface, and run applications are commonly known as operating systems (OS).

An operating system is a fundamental software that acts as an intermediary between the computer hardware and user applications. It manages and allocates system resources such as memory, processors, input/output devices, and storage.

The primary function of an operating system is to provide a user-friendly interface that enables users to interact with the computer system. It offers a set of tools, utilities, and services that allow users to execute programs, access files, and perform various tasks.

The interface can be graphical, command-line-based, or a combination of both, depending on the specific operating system.

Furthermore, an operating system facilitates multitasking, enabling multiple applications to run simultaneously by efficiently allocating system resources.

It also ensures security by enforcing access control mechanisms and protecting the system from unauthorized access or malicious software.

Examples of popular operating systems include Microsoft Windows, macOS, Linux, and Android. These operating systems serve as the foundation for running a wide range of applications and provide an essential framework for computer users to interact with their devices effectively.

For more such questions on Programs,click on

https://brainly.com/question/28224061

#SPJ8  

What is the relationship between the SEC and FASB?

Answers

The SEC has the power to establish and uphold accounting rules. The Accounting Standards Codification is one way the FASB establishes standards

What is the role of SEC and FASB?The SEC has the power to establish and uphold accounting rules. The Accounting Standards Codification is one way the FASB establishes standards. Although breaking GAAP can have serious consequences, GAAP is not a legal requirement. SEC and FASB work closely together to establish standards in terms of their connection. In the United States, the Securities Exchange Commission is the primary legislative authority body for establishing financial reporting and requirements. The Financial Accounting and Standard Board, however, has been given this duty by the SEC. For businesses that fall within its purview, the SEC is mandated to develop accounting rules. In the United States, generally accepted accounting principles (GAAP) for both public and private businesses as well as nonprofit organizations are established and interpreted by the Financial Accounting Standards Board.

To learn more about FASB refer to:

https://brainly.com/question/25686382

#SPJ4

Which of the following is a unique identifier attached to an IP address that makes it easier for humans to remember the location of a device, resource, or entity on the internet?
O Domain NameO Uniform Resource Locator (URL)O Internet Protocol (IP)O Information Architecture

Answers

The unique identifier attached to an IP address that makes it easier for humans to remember the location of a device, resource, or entity on the internet is the domain name.

An Internet Protocol address (IP address) is a unique numerical identifier assigned to every device connected to a computer network that uses the Internet Protocol for communication. It allows for two-way communication, enabling the network to locate and connect with any device that has an IP address. In other words, an IP address is a numerical identifier for a computer or other device on a network. It's the means by which data travels from one device to another on the internet.

A domain name refers to your website address. This is what users type in a browser's search bar to directly access your website. A domain name is unique and cannot be shared between different sites. It allows the users to access websites and resources on the internet using an easy-to-remember name rather than a string of numbers.

To learn more about IP address visit : https://brainly.com/question/14219853

#SPJ11

In one paragraph, explain how understanding social media influencing tactics has impacted the way you see social media posts in your daily life.

Answers

Answer:

Social media influencing tactics has impacted the way I see social media posts in your daily life in the sense that if influences what posts I see and what posts I interact with.

Explanation:

Some examples of social media influencing tactics include ads, videos, social media influencers and so on.

When for example, and ad pops up on my social network and I click on it, similar ads of different products would appear later on my social network. In this way, my interaction with that ad has brought up similar ads to my attention. Likewise interaction with videos and social media influencers. When i interact with one video or social media influencer, a similar video or social media influencer is brought up to my attention in my feed.

Social media refers to the media that is online and includes popular media and social apps , and many more. People can create hare and exchange information regarding topics, ideas, and trends.

There are many aspects of social media and some help in influencing society at large. Such as mass campaigns for political elections. Some of the tactics that we can use in unsocial media include creative content, video subscription, sharing comments.Social media posts encourage you to comment, like, and subscribe and are done to show follows. Can impact the mentality of society and changes a person's behavior.

Learn more about the understanding social media influencing tactics has impacted.

brainly.com/question/20708829.

Short response!

What are two ways to ensure that a sniffer will capture all traffic on a network?

Answers

There are a few ways to ensure that a sniffer will capture all traffic on a network, but two common methods are Promiscuous Mode and Span Port.

Explain Promiscuous Mode and Span Port?

Promiscuous Mode: By putting the network interface card (NIC) into promiscuous mode, the NIC can capture all packets on the network, including those not destined for its own MAC address. This allows the sniffer to capture all traffic on the network, regardless of the destination of the packet.

Span Port: Another way to ensure that a sniffer captures all traffic on a network is to use a span port or mirror port on a network switch. This port is configured to copy all traffic passing through the switch and send it to the designated sniffer device. This method can be useful in situations where promiscuous mode is not possible or practical.

To learn more about network, visit: https://brainly.com/question/29506804

#SPJ1

Danielle wants to record a voice-over to add to a presentation. Other than a microphone, what does danielle need to record the audio?.

Answers

Danielle wants to record a voice-over to add to a presentation. Other than a microphone, he needs an audio recorder software to record the audio.

Programs called audio recording software can record any sound. These programs provide audio manipulation in order to meet project requirements. You can make, listen to, or play around with sound files using this software.

Numerous audio recording devices can use microphones to record speech, music, and other sounds for a variety of purposes, including various types of communications.

Follow the link below to learn more on audio recording devices

https://brainly.ph/question/24522253

#SPJ4

Which of the following is a tool HR managers can use to improve commincations between workers of different generations in the same workplace? A)recruitment pools B)l-9 forms C) mentoring programs D)work/life balance

Which of the following is a tool HR managers can use to improve commincations between workers of different

Answers

Answer:

Mentor Programs

Explanation:

This is because it is talking about different ages which is a mentor type thing

Answer: mentoring programs

Explanation:

A p e x

4. Define star topdogy &. With a suitable diagram.

Answers

Every device on the network is separately connected to the switch or hub, which is the center node, in a network structure known as a star topology. This topology gets its name from the way it appears visually, which is similar to a star.

A star network is a local area network (LAN) topology in which every node, such as a PC, workstation, or other device, is directly connected to a single shared hub computer. As a result, a star network is sometimes referred to as having a hub-and-spoke structure.

The diagram of star topology is attached below.

Learn more about star topology, here:

https://brainly.com/question/32256320

#SPJ1

4. Define star topdogy &. With a suitable diagram.

Every device on the network is separately connected to the switch or hub, which is the central node, in a network topology known as a star topology.

Thus, This topology gets its name from the way it appears visually, which is similar to a star.

Star and bus topologies are frequently combined to create a structure known as a tree. This happens when the bus topology's backbone is connected to the star topology's switch.

Network topology diagrams are used to describe a network's connections and devices visually, enabling you to visualize how devices communicate with one another.

Thus, Every device on the network is separately connected to the switch or hub, which is the central node, in a network topology known as a star topology.

Learn more about Topology, refer to the link:

https://brainly.com/question/10536701

#SPJ1

when you request a new virtual machine instance in ec2, your instance will automatically launch into which of the following?

Answers

When requesting a new virtual machine instance in Amazon EC2, the instance will automatically launch into one of the available Amazon EC2 Availability Zones, which are isolated data centers with redundant infrastructure for increased reliability and resilience.

When you request a new virtual machine instance in EC2, your instance will automatically launch into one of the available Amazon EC2 Availability Zones.

Amazon Elastic Compute Cloud (EC2) is a web service that offers scalable computing capacity in the Amazon Web Services (AWS) cloud. Using EC2 eliminates the requirement for upfront infrastructure expenditures, and users only pay for the computing capacity they use. EC2 provides developers with the tools to create fault-tolerant and scalable applications.

Virtual Machine instance in EC2In EC2, when you request a new virtual machine instance, your instance will automatically launch into one of the available Amazon EC2 Availability Zones. The AWS cloud infrastructure is composed of several different data centers distributed over various geographic locations known as regions and availability zones.

An Availability Zone (AZ) is an AWS data center that has redundant power, cooling, and networking, and is segregated from other data centers in terms of flood and earthquake risk. An AZ is a completely isolated location within a given geographic region where AWS provides services. Each region has a minimum of two Availability Zones.

Learn more about Amazon EC2: brainly.com/question/30394771

#SPJ11

When you touch a warm picnic table , your hand becomes warmer. Explain how energy conservation applies to this situation

Answers

When you contact a warm picnic table, this transfer occurs because your hand has a lower surface temperature than the table, which allows the heat to pass from the table to your hand. You can see how this procedure conserves energy.

Why should we conserve energy?

Energy conservation is essential for limiting climate change. It helps to replace non-renewable resources with renewable energy. When there are energy shortages, energy saving is frequently more cost-effective and environmentally friendly than increasing energy output.

What kind of energy is that?

There are numerous shapes that energy can take. Examples of these energies include gravitational energy, mechanical energy, electrical energy, sound energy, chemical energy, nuclear or atomic energy, light energy, heat energy, and so on.

To know more about conserves energy visit:-

https://brainly.com/question/13949051

#SPJ1

A testing lab wishes to test two experimental brans of outdoor pain long each wiil last befor fading . The testing lab makes six gallon s of each paint to test. The resultare Shown to see how

Answers

Answer:

The answer is "\(\bold{Brand \ A \ (35, 350, 18.7) \ \ Brand \ B \ (35, 50, 7.07)}\)"

Explanation:

Calculating the mean for brand A:

\(\to \bar{X_{A}}=\frac{10+60+50+30+40+20}{6} =\frac{210}{6}=35\)

Calculating the Variance for brand A:

\(\sigma_{A}^{2}=\frac{\left ( 10-35 \right )^{2}+\left ( 60-35 \right )^{2}+\left ( 50-35 \right )^{2}+\left ( 30-35 \right )^{2}+\left ( 40-35 \right )^{2}+\left ( 20-35 \right )^{2}}{5} \\\\\)

     \(=\frac{\left ( -25 \right )^{2}+\left ( 25 \right )^{2}+\left ( 15\right )^{2}+\left ( -5 \right )^{2}+\left ( 5 \right )^{2}+\left ( 15 \right )^{2}}{5} \\\\ =\frac{625+ 625+225+25+25+225}{5} \\\\ =\frac{1750}{50}\\\\=350\)

Calculating the Standard deviation:

\(\sigma _{A}=\sqrt{\sigma _{A}^{2}}=18.7\)

Calculating the Mean for brand B:

\(\bar{X_{B}}=\frac{35+45+30+35+40+25}{6}=\frac{210}{6}=35\)

Calculating the Variance for brand B:

\(\sigma_{B} ^{2}=\frac{\left ( 35-35 \right )^{2}+\left ( 45-35 \right )^{2}+\left ( 30-35 \right )^{2}+\left ( 35-35 \right )^{2}+\left ( 40-35 \right )^{2}+\left ( 25-35 \right )^{2}}{5}\)

    \(=\frac{\left ( 0 \right )^{2}+\left ( 10 \right )^{2}+\left ( -5 \right )^{2}+\left (0 \right )^{2}+\left ( 5 \right )^{2}+\left ( -10 \right )^{2}}{5}\\\\=\frac{0+100+25+0+25+100}{5}\\\\=\frac{100+25+25+100}{5}\\\\=\frac{250}{5}\\\\=50\)

 Calculating the Standard deviation:  

\(\sigma _{B}=\sqrt{\sigma _{B}^{2}}=7.07\)

How did tribes profit most from cattle drives that passed through their land?
A.
by successfully collecting taxes from every drover who used their lands
B.
by buying cattle from ranchers to keep for themselves
C.
by selling cattle that would be taken to Texas ranches
D.
by leasing grazing land to ranchers and drovers from Texas

Answers

The way that the tribes profit most from cattle drives that passed through their land is option D. By leasing grazing land to ranchers and drovers from Texas.

How did Native Americans gain from the long cattle drives?

When Oklahoma became a state in 1907, the reservation system there was essentially abolished. In Indian Territory, cattle were and are the dominant economic driver.

Tolls on moving livestock, exporting their own animals, and leasing their territory for grazing were all sources of income for the tribes.

There were several cattle drives between 1867 and 1893. Cattle drives were conducted to supply the demand for beef in the east and to provide the cattlemen with a means of livelihood after the Civil War when the great cities in the northeast lacked livestock.

Lastly, Abolishing Cattle Drives: Soon after the Civil War, it began, and after the railroads reached Texas, it came to an end.

Learn more about cattle drives from

https://brainly.com/question/16118067
#SPJ1

Which scenario might indicate a reportable insider threat security incident?

Answers

The scenario might indicate a reportable insider threat security incident is a coworker removes sensitive information without authorization. The correct option is b.

What is threat security?

Any situation or occurrence that may negatively affect an organization's operations, assets, users, other organizations, or the country through the use of a system, whether through illegal access, information deletion, disclosure, modification, or denial of service.

Threats can be broken down into four groups: conditional, veiled, direct, and indirect.

Therefore, the correct option is b, A coworker removes sensitive information without authorization.

To learn more about threat security, refer to the link:

https://brainly.com/question/17488281

#SPJ1

The question is incomplete. Your most probably complete question is given below:

A coworker uses a personal electronic device in a secure area where their use is prohibited.

A coworker removes sensitive information without authorization

Coworker making consistent statements indicative of hostility or anger toward the United States in its policies.

Proactively identify potential threats and formulate holistic mitigation responses

. write a guessing game where the user has to guess a secret number (generated randomly between 0 and 1000000). after every guess the program tells the user whether their number was too large or too small. at the end the number of tries needed to guess the value should be printed on the screen. you should count as only one try if the user is guessing the same value multiple times consecutively.

Answers

You can use the following code to create a guessing game with a secret number generated between 0 and 1,000,000:

import random

# Generate a random secret number
secret_number = random.randint(0, 1000000)

# Initialize the guess counter
tries = 0

# Ask user to make a guess
while True:
   guess = int(input('Guess the number: '))

   # Check if user has already guessed the same number
   if guess == secret_number:
       tries += 1
       print('You guessed the secret number in', tries, 'tries!')
       break
   elif guess > secret_number:
       tries += 1
       print('Too large!')
   elif guess < secret_number:
       tries += 1
       print('Too small!')

Learn more about Programming:

https://brainly.com/question/29330362

#SPJ11

4. What is the difference between head tag and heading tag?​

Answers

Answer 515be559d883f8eab00011e5
head is the tag at the top of your page containing your meta-tags, styles, scripts and title. headings are the h1, h2, h3 etc tags that allow you to size your text. a is an anker usable in the url for navigating to other pages or as in-page navigation.

Make Your Own Flowchart

Answers

Answer:

https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcS5V59B3u23rfG-bXj8jNoV7rXfV62cyPnkcg&usqp=CAU

an example of a flow chart

Explanation:

Why would someone get a patent for their invention?

1. to sell their idea


2. to make their idea public domain


3. to be able to name the invention after themselves


4. to keep others from reproducing their idea

Answers

Answer:

4.To keep other from reproducing their idea .

Explanation:

It is regard as an exclusive right own on a invention .The inventor must disclosed the technical information about  the product to the public before a patent is granted .

It is the legal  authorization given to an inventor for sharing his intellectual property to the public this also restrict others from making ,using or selling the invention for a limited .

there are 3 type of patents ,Utility patents design patents and plant patent.

7.

"You win!" never displays. What line is responsible for this error?

1

var score

0

2

onEvent

"button2"

"click"

function

3

var score

score + 1

if

score

5

setText ("display", "You win!");

A. 1

B. 3

ОООО

C. 4

D. 5

Answers

Answer:

The answer is "4".

Explanation:

In this code, on line number 4, it will give the error message, and its correct solution can be defined as follows:

In this code, a variable "score" is declared, that holds a value that is 0, and in the next step, a method "onEvent" is declared that uses a method, and in the if block, it checks the "score" value that is less than 5 and it will print the message.

Technician A says that if a fuse blows it is good practice to replace it with a larger fuse to try to stop it from blowing. Technician B says that fuses can be tested quickly with a test light. Who is correct?

Answers

B is correct your welcome

question 12 :ernesto's group has made a massive spreadsheet containing data from several sources. which feature could the group use to easily sort a series of data to help improve their understanding of the information?

Answers

A sizable spreadsheet created by Ernesto's team contains information from numerous sources.  if the worksheets you want to view are in the same workbook. To view a worksheet, click on it. Click New Window under the Window group on the View tab.

What is row number ?

For each sheet you want to view, repeat steps 1 and 2. Simply click the row number or column alphabet to select the first one, then move the pointer to the last row or column you want to select. Blank Workbook should be double-clicked under Available Templates. keys on the keyboard You may also hit CTRL+N to instantly create a brand-new workbook that is empty. By clicking inside a cell, you can select the one you want to format. The Home Toolbar's % style button should be clicked.

To learn more about  empty from given link

brainly.com/question/16588531

#SPJ4

Why is it important to know the risks that exist on the Internet?

to know when to stay offline
to avoid all online threats
to prevent computer hacking
to be able to stay safe online

Answers

Answer:

D:  To be able to stay safe online.

Explanation:

Correct on quiz.

Answer:

d trust ME

Explanation:

if lain and Wi-Fi were to go out at the same would the circuit break

Answers

Answer:

yes and no because the LAN circuit would stop the connection and the Wi-Fi circuit would fry

Computer _ rely on up to date definitions?

A. Administrators
B. Malware Scan
C. Firmware updates
D. Storage Drivers

Answers

Answer:  The correct answer is B. Malware Scan

Explanation:

The word "definition" only applies to antivirus and malware removal applications that scan for patterns using the definitions. The other choices do not use definitions. Firmware updates rely on images, storage drives use drivers and administrators are user privilege type.

Which of the following is a part of a DML statement? a. CREATE b. ALTER c. DROP d. SELECT. SE_LECT

Answers

d. SELECT

"SELECT" is a part of a DML statement.

What is DML?

DML, or Data Manipulation Language, is a subset of database operations used to insert, delete, and update data. A DML is frequently a sublanguage of a larger language, such as SQL; DML includes some of the language's operators. Because some users can perform both read and write selection, selecting read-only data is closely related to and sometimes considered a component of a DML.

Structured Query Language, or SQL, is a popular data manipulation language that is used to retrieve and manipulate data in a relational database. SQL allows you to perform database operations as well as create databases. SQL performs the required tasks by using specific commands such as Create, Drop, Insert, and so on.

To know more about DML, visit: https://brainly.com/question/25757965

#SPJ4

Why should you use a server provider instead of a personal server?

Answers

One should use a service provider rather than a personal server because Dedicated Servers services may provide the power and control you need for network administration while also keeping your network secure and saving you time and money. You may designate servers to accomplish tasks such as maintaining several websites or coordinating all of your company's printing.

What is a dedicated Server?

A dedicated hosting service, also known as a dedicated server or managed hosting service, is a form of Internet hosting in which the client rents a whole server that is not shared with anybody else.

If your website is having difficulty keeping up with increased traffic, it may be time to convert it to a dedicated server. This is essentially a server that exclusively hosts your site, and it may not only increase the speed of your site, but also improve page loading times and help you optimize security.

Learn more servers:
https://brainly.com/question/28320301
#SPJ1

How does the brain influence your emotions, thoughts, and values?

Answers

Amygdala. Each hemisphere of the brain has an amygdala, a small, almond-shaped structure. The amygdalae, which are a part of the limbic system, control emotion and memory and are linked to the brain's reward system, stress, and the "fight or flight" reaction when someone senses a threat.

What are the effects of the brain?Serotonin and dopamine, two neurotransmitters, are used as chemical messengers to carry messages throughout the network. When brain areas get these signals, we recognize things and circumstances, give them emotional values to direct our behavior, and make split-second risk/reward judgments.Amygdala. The amygdala is a small, almond-shaped structure found in each hemisphere of the brain. The limbic systems' amygdalae control emotion and memory and are linked to the brain's reward system, stress, and the "fight or flight" response when someone perceives a threat.Researchers have demonstrated that a variety of brain regions are involved in processing emotions using MRI cameras. Processing an emotion takes happen in a number of different locations.

To learn more about Amygdala, refer to:

https://brainly.com/question/24171355

#SPJ1

What is one way the Design tab in the PowerPoint Online application is used?
Add a chart
Choose a variant
Create an image
Transition slides

Answers

Answer:

select a theme

Explanation:

One way the Design tab in the PowerPoint Online application is used is to: B. choose a variant.

What is PowerPoint Online?

PowerPoint Online can be defined as a web-based software application that is designed and developed by Microsoft Inc., in order to avail its end users an ability to create slides, customize backgrounds and choose a variant, especially during a presentation.

This ultimately implies that, choosing a variant is one way the Design tab in the PowerPoint Online application is used by end users.

Read more on PowerPoint here: https://brainly.com/question/26404012

What types of tasks can you complete using Microsoft Excel (name and describe at least 3)

Answers

Answer:

1) Data Entry and Storage. ...

2) Accounting and Budgeting. ...

3) Collection and Verification of Business Data. ...

4) Scheduling. ...

5) Build Great Charts. ...

6) Help Identify Trends. ...

7) Administrative and Managerial Duties. ...

9) Return on Investment.

Other Questions
Refer to Table 2-2 below. The table contains some production possibilities for an economy for a given year. If the production possibilities frontier is bowed outward, then "?" could be cakes / rolls in dozens 100/5000 120/4600 140/ ? In one hour the temperature in a city fell from 4.3C to 3.2C. How many degrees celsius did the temperature fall during the one hour period? (Enter an exact number.) Dean ran 5 miles this week and wants to know how many kilometers he ran. His work is below. (For example, a mother uses psychology in raising her children. A restaurant server uses psychology in dealing with customers.) Write one to two paragraphs explaining how the person uses principles of psychology most days on the job. What financial services use case allows for tokenization of a bank-issued currency? Does anyone have the Convection Cells Gizmo Answer key???!!!!!I NEED IT TO PAST SCIENCE CLASS PLEASE How does a polar bear use the energy released by the food it eats ? Find the value of R and S 6. Middle school class representatives conducted a poll during lunch to see which activity students wanted for their year-end party. The results are shown in this relative frequency table:a) For the entire school, which was more popular, water slides or roller skating? (1 point)b) 34% of the 6th graders and 50% of the 7th graders want to go to the water slides. What percentage of the 8th graders want to go to the water slides? (1 point)c) Does there seem to an association between grade level and field trip choice? (2 points)d) If this trend continued, would you expect 9th graders to prefer the water slides or roller skating? Explain your answer. (2 points) Skeletal and Muscular Systems Review - Extra Credit - BIOL 2401 Answer the following questions. 1. What makes the hyoid bone different from all the other bones? 2. How many bones does an adult human b what property of arp causes the nics receiving an arp request to pass the data portion of the ethernet frame to the arp process? Software design tools are represented on-screen as? A. icons B. Masks C. Filter D. Window Imagine that you are working with a patient in a healthcare setting who exhibits signs of low self confidence describe one modifying habit a that could help your patient build self confidence Which of the following is a human activity that can cause a freshwater resource to become hypoxic? Use of fertilizers on farms and yards Increased death of aquatic organisms Decrease in algae and microorganisms Using more plastics and paper products in 4 sentences: how did hitler, mussolini, nd stalin come to power nd control there people? what did the people have to do nd give up to let these gain power? Approximately ________ lobbyists are currently registered with congress why do we buy items to satisfy other people? find the value of given expression[tex] \sqrt{35 + 1} [/tex] What is the meaning of "low-hanging fruit" as used by the author in Paragraph 21? a car is traveling at 50 mi/h when the brakes are fully applied, producing a constant deceleration of 22 ft/s2. what is the distance (in ft) traveled before the car comes to a stop? (round your answer to one decimal place.)