Basic python coding, What is the output of this program? Assume the user enters 2, 5, and 10.
numA = 0
for count in range(3):
answer = input ("Enter a number: ")
fltAnswer = float(answer)
numA = numA + fltAnswer
print (numA)
Thanks in advance!
:L

Answers

Answer 1

Answer:

17.0

Explanation:

I ran it for you. You could also try that (go to replit).

Basic Python Coding, What Is The Output Of This Program? Assume The User Enters 2, 5, And 10. NumA =

Related Questions

Which of the following describes the line spacing feature? Select all that apply. adds space between words adds space between lines of text adds space between paragraphs adds space at the top and bottom of a page adds bullet points or numerical lists

Answers

Answer:

adds space between lines of text

adds space between paragraphs

Explanation:

A ___________ is a variable used to pass information to a method.

Answers

Answer:

A parameter is a variable used to pass information to a method.

Explanation:

A parameter is a variable used to pass information to a method.

What are the features of parameter?

In general, a parameter "beside, subsidiary" is any quality that aids in describing or categorizing a certain system. In other words, a parameter is a component of a system that is crucial or useful for identifying the system or assessing its functionality, status, or other characteristics.

In some fields, such as mathematics, computer programming, engineering, statistics, logic, linguistics, and electronic music production, the term "parameter" has more precise definitions.

In addition to its technical applications, it also has broader meanings, particularly in non-scientific situations. For example, the terms "test parameters" and "game play parameters" refer to defining qualities or boundaries.

A novel method of characterizing surface texture, in particular surfaces having deterministic patterns and features, is the use of feature parameters.

Traditional methods for characterizing surface texture, such profile and areal field parameters, are considered as supplementary to the feature parameter approach.

Learn more about parameter, here

https://brainly.com/question/29911057

#SPJ6

Complete the problem about Olivia, the social worker, in this problem set. Then determine the telecommunications tool that would best meet Olivia's needs.


PDA

VoIP

facsimile

Internet

Answers

Answer:

PDA is the correct answer to the following answer.

Explanation:

PDA refers for Programmable Digital Assistant, which is a portable organizer that stores contact data, manages calendars, communicates via e-mail, and manages documents and spreadsheets, typically in conjunction with the user's personal computer. Olivia needs a PDA in order to communicate more effectively.

What is the difference between an information system and a computer application?

Answers

Answer:

An information system is a set of interrelated computer components that collects, processes, stores and provides output of the information for business purposes

A computer application is a computer software program that executes on a computer device to carry out a specific function or set of related functions.

I need help solving this problem on Picoctf. The question is What happens if you have a small exponent? There is a twist though, we padded the plaintext so that (M ** e) is just barely larger than N. Let's decrypt this: ciphertext. The ciphertext is this. I tried using stack flow and the rsatool on GitHub but nothing seems to work. Do you guys have any idea of what I can do. I need to solve this problem asap

Answers

Explanation:

Explanation:

RSA encryption is performed by calculating C=M^e(mod n).

However, if n is much larger than e (as is the case here), and if the message is not too long (i.e. small M), then M^e(mod n) == M^e and therefore M can be found by calculating the e-th root of C.

What are some things you need to be careful not to change while editing a macro? Check all that apply. commas names spaces brackets rows columns

Answers

Answer:

commas, spaces, brackets

Explanation:

I hope this helps.

If not cleared out, log files can eventually consume a large amount of data, sometimes filling a drive to its capacity. If the log files are on the same partition as the operating system, this could potentially bring down a Linux computer. What directories (or mount points) SHOULD be configured on its own partition to prevent this from happening?

Answers

Answer:

/var

Explanation:

The /var subdirectory contains files to which the system writes data during the course of its operation. Hence, since it serves as a system directory, it would prevent log files from consuming a large amount of data.

Answer:

/var

Explanation:

Hope this helps

The code below assigns the 5th letter of each word in food to the new list fifth. However, the code currently produces errors. Insert a try/except clause that will allow the code to run and produce of list of the 5th letter in each word. If the word is not long enough, it should not print anything out. Note: The pass statement is a null operation; nothing will happen when it executes.
food = ["chocolate", "chicken", "corn
fifth = []
for x in food:
fifth.append(x[4])

Answers

Answer:

Answered below

Explanation:

foods = ["chocolate", "chicken", "corn"]

fifth_char = []

for food in foods:

"""Add a try statement to add fifth character to fifth_char list. If word is not long enough, the except part executes the the pass and nothing is printed.""'

try:

fifth_char.append(food[4])

except:

pass

#print out elements in new list

for c in fifth_char:

print(c)

jettison folk 2007, Magnum opus, be moving, offers poisoned commentary on the film industry.

Answers

Answer:

I'm a little confused...

Explanation:

Can you reword this please?

Explain the term software dependability. Give at least two real-world examples which further elaborates
on this term. Do you think that we can ignore software from our lives and remain excel in the modern
era? What is the role of software in the current pandemic period?

Answers

Answer:

Explanation:In software engineering, dependability is the ability to provide services that can defensibly be trusted within a time-period. This may also encompass mechanisms designed to increase and maintain the dependability of a system or software.Computer software is typically classified into two major types of programs: system software and application software.

what is the weather in Ireland?​

Answers

Answer:

Year-round, Irish weather as a whole tends to stick with what it knows: Mildly crisp weather, around 270 days of rain, with sunshine and wind. Although slight fluctuations occur dependent on the month and season, the average yearly temperature is around 50 degrees Fahrenheit.

Answer:

hi

Explanation:

The climate of Ireland is mild, humid and changeable with abundant rainfall and a lack of temperature extremes. ... January and February are the coldest months of the year, and mean daily air temperatures fall between 4 and 7 °C (39.2 and 44.6 °F) during these months.

have a nice day

I love Ireland very much

What is the name for the part of a camera which can block light when it's closed, and let light in when it's open?


Pixel


Lens


Focus


Shutter

Answers

dnt listen to the link stuff

Do you think renewable energy can power the world? If so, why?

Answers

Answer:

yes

Explanation:

Because it is a new safer and more energy efficient way of producing energy

If a 9V, 7W radio is on from 9am to 12pm. Calculate the amount of charge that flows through it, hence or otherwise the total number of free electrons that pass through at a point at the power supply terminals​

Answers

Answer:

Q=It

and

p=IV

Given, v=9V P= 7W

I=P/V

I =7/9

Also, time(t) from 9am to 12pm is 3hrs

Converting into sec =3×3600

t=10800

Q= 7/9 ×10800

Q =8400C

g Write an UPDATE statement that changes the address for the row with vendor_id 4 so the suite number (Ste 260) is stored in vendor address instead of vendor address 1. Then, use SQL Developer to verify the change (you may need to click the Refresh button at the top of the Data tab to see the change). If this works correctly, go back to the tab for the UPDATE statement and click the Commit button to commit the change.

Answers

Answer:

UPDATE 'Vendors' SET 'address' = 'Ste 260' WHERE 'vendor_id' = 4

Explanation:

Required

Write an update statement

The question is incomplete as the table name is not given.

So, I will make the following assumptions.

Table name = Vendors

So, the update statement is:

UPDATE 'Vendors' SET 'address' = 'Ste 260' WHERE 'vendor_id' = 4;

The above statement queries the vendors table and changes the address  of vendor_id 4 from the initial value to Ste 260

From the philosophical standpoint, especially in the discussion of moral philosophy or ethics, why do we consider “murder” or “killing” wrong or bad?

Answers

Explanation:

Morality is a set of values ​​and habits that a society acquires over time and can be categorized as good and bad values, right and wrong, justice and crime. Ethics is defined as the study of morals, the practical application of moral behaviors defined by society.

Therefore, the concept of "murder" or "killing" is seen as an immoral act by the vast majority of society around the world, strengthened by the set of moral conduct common to all human beings, which are the Articles on the Universal Declaration of Human Rights. Human Rights, which is an official document of the UN, which contains several universair and analytical rules on the rights of every individual, such as the right to life, security, freedom, etc.

User defined blocks of code can be created in
Snap using the
feature.
A. make a block
B. duplicate
C. create
D. define a function

Answers

D....................

Joseph learned in his physics class that centimeter is a smaller unit of length and a hundred centimeters group to form a larger unit of length called a meter. Joseph recollected that in computer science, a bit is the smallest unit of data storage and a group of eight bits forms a larger unit. Which term refers to a group of eight binary digits? A. bit B. byte O C. kilobyte D. megabyte​

Answers

Answer:

byte

Explanation:

A byte is made up of eight binary digits

QUESTION 1
Which of the following is an example of firewall?
O a. Notepad
b. Bit Defender internet Security
O c. Open Office
O d. Adobe Reader

Answers

Answer is Bit defender Internet security
B

what of the following uses heat from deep inside the earth that generates steam to make electricity​

Answers

Answer:

Geothermal power plants.

Consider the following recursive method.

public static String doSomething(String str)
{
if (str.length() < 1)
{
return "";
}
else
{
return str.substring(0, 1) + doSomething(str.substring(1));
}
}
Which of the following best describes the result of the call doSomething(myString) ?

A
The method call returns a String containing the contents of myString unchanged.

B
The method call returns a String containing the contents of myString with the order of the characters reversed from their order in myString.

C
The method call returns a String containing all but the first character of myString.

D
The method call returns a String containing only the first and second characters of myString.

E
The method call returns a String containing only the first and last characters of myString.

Answers

Answer:

A

The method call returns a String containing the contents of myString unchanged.

Explanation:

Which of the following best describes the safety of blogging

Answers

we need the options

Generally safe, but there may be some privacy and security concerns. Therefore option B is correct.

While blogging can offer a relatively safe platform for expressing ideas and connecting with an audience, it is not entirely risk-free.

Privacy and security concerns can arise, especially when bloggers share personal information or discuss sensitive topics.

Cybersecurity threats, such as hacking or data breaches, can also compromise a blogger's personal information or their readers' data.

Additionally, bloggers should be mindful of online harassment and potential legal issues related to content ownership or copyright infringement.

Being aware of these risks and implementing best practices for online safety can help ensure a more secure and enjoyable blogging experience.

Therefore option B is correct.

Know more about Cybersecurity:

https://brainly.com/question/31928819

Your question is incomplete, but most probably your full question was.

Which of the following best describes the safety of blogging?

A. Completely safe, with no risks involved.

B. Generally safe, but there may be some privacy and security concerns.

C. Moderately safe, but potential risks exist, especially with sensitive topics.

D. Highly unsafe, with significant risks to personal information and security.

What is the name for the last word on a dictionary page?
a. Final word
c. First guideword
b. Second guideword
d. None of these
Please select the best answer from the choices provided

A
B
XOOO
с

Answers

Answer:

bbbbbbbbbbbbbbbbbbbbbbbb

Explanation:

bbbbbbbbbbbbbbbbbbbbbbbbb

Answer:

B.Second guideword

Explanation:

Explain the paging concept and main disadvantages of pipelined
approaches? Compare the superscalar and super pipelined approaches
with block diagram?

Answers

Answer:

PAGINACIÓN En la gestión de memoria con intercambio, cuando ... Debido a que es posible separar los módulos, se hace más fácil la modificación de los mismos. ... Ventajas y Desventajas de la segmentación paginada

Explanation:

is a general-purpose computing device?

Answers

Answer: I think so

Explanation: All mainframes, servers, laptop and desktop computers, as well as smartphones and tablets are general-purpose devices. In contrast, chips can be designed from scratch to perform only a fixed number of tasks, but which is only cost effective in large quantities (see ASIC).

Please give brainliest not this file virus exploiter

Write one line Linux command that performs the required action in each of the problems given below: (a) Find the difference in text between two text files File1.txt and File2.txt and save the result in a file named result.txt (b) Change the permissions of the file remote_driver.c such that the owner has the permissions to read, write and execute and anybody other than the owner can only read the file but cannot write or execute. (c) Search for the string ir_signal in the file /home/grad/remote_driver.c and print on the terminal the number of instances of the given string in the file /home/grad/remote_driver.c (d) Reboot the system after 5 minutes. (e) Display the list of processes currently being run by the user harvey. (f) Print 3 copies of a file named my_driver.c from a printer that has a name HPLaserJet4300. (g) Put the last 40 lines of the file driver_log.log into a new file final_fault.txt.

Answers

You have to add the integer

g Write a function named vowels that has one parameter and will return two values. Here is how the function works: Use a while loop to determine if the parameter is greater than 1. If it is not greater than 1, do the following: Display a message to the user saying the value must be greater than 1 and to try again. Prompt the user to enter how many numbers there will be. Use a for loop that will use the parameter to repeat the correct number of times (if the parameter is 10, the loop should repeat 10 times). Within this for loop, do the following: Generate a random integer between 65 and 90 Convert this integer to is equivalent capital letter character by using the chr function. If num is the variable with this integer, the conversion is done like this: ch

Answers

10-20-100.40 = my bin =nice

3. Never
to any instant messages, phone call, video call, or screen
staring requests from someone you do not know.
A. reply
B. refuse
C. forward text
D. accept pictures

Answers

Answer:

[tex]\color{Blue}\huge\boxed{Answer} [/tex]

B.Refuse

Answer:

Never reply to any instant messages, phone call, video call, or screen staring requests from someone you do not know.

Hope it helps u ARMY!!

What is a font?
O How the text for a paragraph appears
O A display of text characters in a specific style and size
O Text that has been made bold
O Artistic elements you can add to text

Answers

A display of text characters in specific style
answer: a display of text characters in a specific style and size

How was the first computer reprogrammed

Answers

Answer:

the first programs were meticulously written in raw machine code, and everything was built up from there. The idea is called bootstrapping. ... Eventually, someone wrote the first simple assembler in machine code.

Explanation:

Other Questions
describe how Eratosthenes advanced humanity's understanding of the earth https://player-ui.mheducation.com/#/epub/urn:com.mheducation.openlearning:enterprise.roster:prod.us-east-1:section:d54e74d0-d683-11ea-97cc-c3fbca93616d#epubcfi(%2F6%2F164%5Bdata-uuid-0e0d1461930e46d8a11481979e97290d%5D!%2F4%2F92%5Bdata-uuid-7ef48aaecd1544598a282d52cb63d16d%5D%2F4%5Bdata-uuid-4af68fac5632455b84b18cc6c308e18e%5D%2F4%5Bdata-uuid-28e68eaccd6d4410ae558caea48280b2%5D%2F4%5Bdata-uuid-ae0a35932a8e42b493c69eda4fdfeeac%5D) copy paste the link it number two all the way in the bottom Which of these are present in both woody and herbaceous stems? (Select all that apply.)A. xylemB. ringsC. seedlingsD. phloem can some please help me with this problem? Explain the transfer of authority symbolized by the transfer of keys between Helen, Kate, and Annie throughout the play. Write a paragraph of at least 125 words. help pls Evaluate. 169 Enter your answer in the box. Fill in the blankDNA IS NOT TURNED ON ALL OF THE _____ IN ALL OF THE CELLS. Hurry 10pts Identify each sentence as either the topic or the theme of "The Three Little Pigs." Three pigs build houses from different materials and try to avoid a wolf. In the long run, taking the time to do something well, such as constructing a house from bricks, is better than taking a shortcut, such as building a house from straw. Writing You ask 90 of your classmates if they like sports. There are 20 girls who like sports and 15 boys who like sports. There are 30 boys and 25 girls who do not like sports. Complete the two-way frequency table to show the results of the survey. What are the categories of the row variable? What are the categories of the column variable? Use pencil and paper. How does the table change if the row and column variables are switched? Critical Thinking About Initial Question with Corresponding Steps:Use these symbols in the Critical Thinking box and on the board to identify the following:= A-Ha! moments = Point of Confusion = Need to research = Im confident about1. Show your thinking about your initial question, and identify your Point of Confusion. Use a graphic organizer for non-math questions.1,728 meters cubedb. 5,425.92 meters cubedThe answers are in pi form... You multiplied by pi.Multiply the radius squared times the height and leave it in pi form.c. 144 meters cubedd. 452.16 meters cubed/82. List the general steps that you took leading up to your Point of Confusion.I have to read the questionDraw a cylinder Label it with R:12H:12 4.write the equation we are not using pie so it will be V=r2(h) 5. 12/2x (12) you get 1,728 /8Tutorial Question (Point of Confusion):Write an authentic question about your Point of Confusion that is different from your initial question. (LEVEL 2 or 3) How do we find the volume of this cylinder in pie form?/4Reflection (In class---After the Tutorial) Was I a student presenter this week: Yes No How would you explain to someone else how to do what you learned on your POC? In my poc i learn that i have to read better the question because it was asking the volume of a cylinder but in a pie forMy greatest Ah-Ha Moment! this week was.... When I mess up in my multiplication. This its useful because it helps me understand how to solve math problems usually /10THE ANWSER IS *1.going camping or hiking in the wilderness*3.traveling to a new place or another *5 countrycreating art, playing an instrument, or writing a book A random sample of 80 college students showed that 44 had driven a car during the day before the survey was conducted. Suppose that we are interested in forming a 80 percent confidence interval for the proportion of all college students who drove a car the day before the survey was conducted.Where appropriate, express your answer as a proportion (not a percentage). Round answers to three decimal places. The area of a rectangle is 192 cm. The length of the rectangle is 16 cm. What is the width? 192 = 16w -(solve for w) For the U.S. soft drink market, of the 300 million people in the U.S., 80% of the population is the maximum number of consuming units. The average soft drink consumer buys 365 soft drinks a year at an average price of $0.98 per drink. What is the annual market potential of soft drink in dollar value please help i don't understand. At which position is the southern hemisphere experiencing spring? Point A Point B Point C Point D **Jane found money in her pocket. She went to a convenience store and spent 1/4 of her money on chocolate milk, 3/5 of her money on a magazine, and the rest of her money on candy. What fraction of her money did she spend on candy? Balance the equation by choosing the correct coefficient numbers in the drop down menus.[Select]SO2 +[Select]VH [Select]S +[ Select]H20It is suggested you write this on scratch paper and balance it before choosing your answers :) Which task would a colorectal surgeon perform?1. analyzing patients' diets for food sensitivities2. prescribing drugs to treat ulcers3. correcting structural problems of the jaw4. removing tumors in the large intestine A character steps out of her home and into a thick fog. Based on what you know about fog, what might it symbolize about the character? solve for x: 3 x - s = r 1. If your vehicle skids, steer the vehicle-to straighten the vehicle out, then-A. opposite the direction of the skid, in the direction you wish to go.B.in the direction of the ski in the direction you wish to go.C. in the direction of the skid, opposite the direction you wish to go.