PLZ HELP QUICK!! I NEED THE ANSWER RN!! IM BEING TIMED!
What is the output of this program?
numA = 3
for count in range(4,7):
numA = numA + count
print(numA)
Output:

Answers

Answer 1

Answer:

The answer is 18

Explanation:

Answer 2

Answer:

the answer is 18

Explanation:

edge 2020


Related Questions

Giving 5 stars, a Thanks, 80 points, and Branliest to whoever answers them correctly.
What refers to how a game’s player shapes what happens in their own personal game experience by making choices on how they play?
Group of answer choices

pseudostory

metagame

ludonarrative

iambic pentameter

Answers

Answer:

Explanation:

The answer is ludonarrative.

Please mark me brainliest.

hris has received an email that was entirely written using capitalization. He needs to paste this text into another document but also ensure that the capitalization is removed.

What should Chris do?

Answers

He should un caps lock it

*
Which of the following variable names are invalid?
123LookAtMe
Look_at_me
LookAtMe123
All of these are valid

Answers

Answer:

I think they're all valid but the validility depends on the website your using the usernames on.

Explanation:

Which tab should a user click to access the Page Borders feature of Word?

File
Insert
Home
Design

Answers

Answer:

design

Explanation:

i took the assignment

Answer: design

Explanation:

highlight various stages in evolution of computer?​

Answers

Answer:

Computing began at the mechanical level, added an information level (software), then a human level and finally a community level; it is an example of general system evolution.

Information: Reduce information overload, clas...

Level: Requirements

Mechanical: Reduce physical heat or force ov...

Community: Reduce community overload, clas...

Explanation:

What would happen if a program try to access a variable that was to find locally in another part of the program?

Answers

They project would fail aka not succeed

Which is NOT contained within a public key (digital) certificate? the digital signature of certification authority information identifying the certification authority (issuer) and the subject (owner) O a reference to the algorithm used to sign the certificate O a shared symmetric key

Answers

a shared symmetric key is NOT contained within a public key (digital) certificate. Instead, it contains information related to the identity of the certificate owner and the certificate issuer, as well as information needed to verify the authenticity of the certificate.

A public key (digital) certificate is a digitally signed document that contains information about the identity of the certificate owner (subject) and the certificate issuer (certification authority). It also includes a public key that can be used to verify digital signatures and encrypt data. However, one thing that is NOT contained within a public key (digital) certificate is a shared symmetric key.A symmetric key is a type of encryption key that is used for symmetric encryption, where the same key is used for both encryption and decryption of data. This type of encryption is typically used for securing data during transit or storage. However, a public key certificate is used for asymmetric encryption, which uses a public key to encrypt data and a private key to decrypt data. This means that there is no shared symmetric key contained within a public key certificate.Instead, a public key certificate contains information such as the digital signature of the certification authority, information identifying the certification authority (issuer) and the subject (owner), and a reference to the algorithm used to sign the certificate. This information is used to verify the authenticity of the certificate and the identity of the certificate owner.

To know more about symmetric visit:

brainly.com/question/31375565

#SPJ11

Mistakes that cause a running program to produce incorrect results are called:____.
a. syntax errors
b. logic errors
c. compiler errors
d. linker errors
e. none of these

Answers

Mistakes that cause a running program to produce incorrect results are called: b. logic errors.

What is a syntax error?

A syntax error can be defined as a type of error that typically occurs due to mistakes in the source code of a software program such as:

Punctuation errorsIncorrect labelsSpelling of words.Spacing

What is a logical error?

A logical error can be defined as a type of error which typically cause a running software program to produce erroneous (incorrect) results due to mistakes, and thereby, leading to a runtime error.

Read more on logical error here: brainly.com/question/18497347

#SPJ1

52. Give a reason why it may be necessary to merge cellsin a table.​

Answers

There are several reasons why it may be necessary to merge cells in a table:

To create larger cells for more complex or detailed information: Merging cells can help to create larger cells that can accommodate more information, making the table more organized and readable.

To create a more visually appealing table: Merging cells can be used to create a more visually appealing table by making it easier to align and format text and data.

To create a title for a group of cells: Merging cells can be used to create a title or heading for a group of cells that would otherwise not have one.

To create a subheadings: Merging cells can be used to create subheadings for a specific group of cells, making the table more organized and readable.

To create summary or total cells: Merging cells can be used to create a summary or total cell for a group of cells, making it easier to understand and analyze the data in the table.

Click this link to view O*NET’s skills section for Geographers. According to O*NET, what are other common skills Geographers need? Check all that apply. reading and writing listening and speaking critical thinking operation and control science technology design equipment selection

Answers

According to this website, the other common skills that Geographers need are: reading and writing, listening and speaking, critical thinking.

What are the required skills?

On this website, there are certain skills that are necessary for intending Geographers to have. These include writing, listening, reading, listenings, speaking, and critical thinking.

These skills are required in order to handle the challenging aspects of the job. The skills also demonstrate the importance of communication in the course of the job. So, only applicants who have these requisite skills will be allowed to take on the job.

Learn more about skills here:

https://brainly.com/question/1233807

#SPJ1

Answer:  The answers are 1,2,3, and 5

reading and writinglistening and speakingcritical thinkingscience

suppose we are given an n-element sequence s such that each element in s represents a different vote in an election, where each vote is given as an integer representing the id of the chosen candidate. without making any assumptions about who is running or even how many candidates there are, design an o(n log n)-time algorithm to see who wins the election s represents, assuming the candidate with the most votes wins

Answers

The candidate who wins the election represented by sequence s can be determined using an o(n log n)-time algorithm by finding the element with the highest frequency in s.

How can we find the element with the highest frequency in the given sequence s?

To determine the candidate with the most votes, we can use a combination of sorting and counting techniques. First, we sort the sequence s in O(n log n) time using an efficient sorting algorithm such as merge sort or quicksort. Then, we iterate through the sorted sequence to count the frequency of each candidate's votes. This can be done in O(n) time by comparing adjacent elements and updating the vote count accordingly.

After counting the frequencies, we can identify the candidate with the highest vote count, which corresponds to the candidate who wins the election. If there are multiple candidates with the same highest vote count, we can either report all of them as winners or choose a tie-breaking mechanism as per the specific requirements of the election.

Learn more about highest frequency

brainly.com/question/29095958

#SPJ11

Chris needs to modify the default bullets that are used in a non numbered list in word which method should he use

Answers

Answer:A

Explanation: just took the test

Answer:

(A) Select the arrow next to the bullet list option in the Paragraph group

Explanation:

1) How is online privacy a technology problem and not a social
problem?

Answers

Online privacy is a technology problem because the level of control over our personal information has become complicated due to the widespread use of technology.

Despite having the option to block the sharing of data, tracking cookies and other surveillance tools can still be used to track our online activity without our permission.
As the growth of internet technology advances, so does the increase in demand for data collection and data sharing, which has led to a rise in cybercrime.
Our personal data is used by companies to create targeted advertisements and personalized content, and if it is not secured correctly, it can be accessed by hackers and cybercriminals.
We are constantly asked to share our personal information when we sign up for social media platforms or online shopping sites, and we often do so without fully understanding the consequences of doing so.
While individuals have some responsibility to protect their own privacy, it is ultimately the responsibility of technology companies to ensure that our data is protected and not used inappropriately.
They need to design their products with privacy in mind, and to ensure that their customers are educated about the risks of sharing personal data online.

Learn more about online privacy here,
https://brainly.com/question/30093342

#SPJ11

Binary code is how computers send, receive, and store information.
True
False

Answers

Answer:

true

Explanation:

Binary code is how computers send, receive, and store information is True.

What is Machine language?

Machine language is the only language that is directly understood by the computer because it is written in binary code.

While writing codes in Machine Language is tiring, tedious, and obsolete as no one really uses it anymore.

It includes High-level languages such as Java, C++, Ruby, Python, etc need to be translated into binary code so a computer can understand it, compile and execute them.

Therefore, the statement is true that's Binary code is how computers send, receive, and store information.

Learn more about binary code here;

https://brainly.com/question/17293834

#SPJ6

Consider the following code snippet that appears in a subclass: public void deposit(double amount) { transactionCount ++; deposit(amount); } Which of the following statements is true?
a) This method will call itself.
b) This method will call itself.
c) This method calls a public method in its subclass.
d) This method calls a public method in its subclass.
e) This method calls a private method in its superclass
f) This method calls a private method in its superclass
g) This method calls a public method in its superclass.

Answers

A is the answer I got a call back at the park today and then we walked in and got it to the park where the store got to

the points a b c and d lie on a straight line ab:bd = 1:4

Answers

The points a b c and d lie on a straight line ab:bd = 1:4 are A line that extends to infinity on both sides and has no curves is called a straight line.AB:BC=3:4.

What do you call a straight line?  

A line is simply an object in geometry denoted as an object with no width that extends on both sides. A straight line is just a line with no curves.

AC=AB+BC=3+4=7;  AC:CD=2:1, i.e. AC=2;   because we get 2 different lengths for AC, we change the given ratio AC:CD to an equivalent one with AC=7 .As follows: AC:CD = 2 : 1 = 7 : 3.5 (multiply both sides by 3.5 )   Now we have AC:CD = 7 : 3.5 and AD = AC+CD= 7+3.5 = 10.5,, and the answer is: the ratio  BC:AD = 4:10.5.

Read more about the straight line:

https://brainly.com/question/3493733

#SPJ1

What is the best online Java editor?

Answers

ava is also well-liked for data analysis, creating hardware, and using server-side software like Apache.

What are Java's fundamentals?

Because of its basic, intelligible structure, Javanese appears to be an easy language to learn. C++ concepts that are challenging and ambiguous are either abandoned or reimplemented in Java. For instance, pointer overloading and operator overloading are not used in Java. Everything in Java is object-oriented, taking the form of an object.

What is Java, exactly?

Millions of devices, including laptops, smartphones, gaming consoles, medical equipment, and many more, employ the item programming language or software platform known as Java. Java's syntax and principles are derived from the C and the C++ languages.

To know more about Java visit:

https://brainly.com/question/29897053

#SPJ4

A teacher assigns the class a project where they will create an overlay so that when they go on a field trip, old photos will pop up on a smartphone screen when the phone is pointed at a certain location. Which of the following terms describes this kind of technology?
virtual reality
augmented reality
mp4
application software

Answers

Answer:

augmented reality

Explanation:

The scenario being mentioned is describing the technology known as augmented reality. This is a newer technological innovation that allows programs to interact with our real world through the device's camera. This is done with an overlay, in which the program detects real-world objects and adjusts the overlay to correctly interact with the real world object on the screen as if it was all being done in the real world. There are many such applications using this technology, from games to GPS systems.

The purpose of a function that does not return a value is Group of answer choices to insert a temporary implementation of a function that can be refined later only used when the function needs to produce output to package a repeated task as a function even though the task does not yield a value to provide a function that can only be included in an assignment statement

Answers

Answer:

to package a repeated task as a function even though the task does not yield a value.

Explanation:

In Computer programming, a function can be defined as a group of organized, reusable sets of code that is used to perform a specific task i.e a single but related action. Thus, a function accepts data as an input, process the data and return a single result or a set of results.

Some of the notable characteristics of a function includes;

I. The name and arguments of the function must be specified by a function.

II. The implementation of a function is usually designed to be hidden from the caller.

IIII. A function define specific tasks that reusable at many points in a program.

A function that does not return a value after it executes is generally referred to as a void function. Thus, a void function uses the keyword "void" and has no explicit return statement in its body, with respect to a data type.

The purpose of a void function is to control returns back to the caller or package a repeated task as a function but, it doesn't yield a value.

Question 5 of 10
If you pay the balance of your credit card bill before the due date, how much
do you pay?
OA. The full amount that you owe
B. The minimum payment on your bill
C. The full amount you owe, plus a service fee
D. The full amount you owe, plus interest for the past month
SUBMIT

Answers

Answer:

b

explination.

By paying the credit card dues early, you will have an advantage over the others as the credit card issuer will report a lower balance to the credit bureaus. This will reflect in your credit report and you can have an edge over the others for a lower credit utilization ratio.

1. Computer Hardware can consist of a

A. monitor, mouse, applications, games
B. keyboard, mouse, operating system
C. monitor, keyboard, CPU and mouse
D. monitor, operating system, applications

Answers

Answer:

C. monitor, keyboard, CPU and mouse.

Explanation:

Computer hardware refers to the physical components of a computer system that can be touched and seen. Some of the major hardware components of a computer include:

Monitor: A display screen that shows the output of the computer.

Keyboard: An input device used for typing and entering data into the computer.

CPU (Central Processing Unit): The "brain" of the computer that processes instructions and performs calculations.

Mouse: An input device used for navigating and interacting with the computer.

Option A is incorrect because a monitor and a mouse are hardware components, but applications and games are software components that run on the hardware. Option B is incorrect because an operating system is software, not hardware. Option D is incorrect because applications and an operating system are software components, not hardware.

Does the directory virus depend upon operating system?​

Answers

A virus is a type of malware that can infect a computer or other device and replicate itself, often causing damage or disruption to the device's normal operation. Some viruses are designed to specifically target certain operating systems, while others are more general and can infect a variety of different types of devices and systems.

It is possible for a virus to specifically target a certain operating system, in which case it would depend on that operating system in order to function. However, many viruses are designed to be more general and can infect multiple types of operating systems.

The best way to protect against viruses is to use antivirus software, keep the operating system and other software up to date with the latest security patches, and practice safe browsing and email habits.

I need help I did not mean to do that to my computer

I need help I did not mean to do that to my computer

Answers

Answer:

Man...I don't think you can fix that yourself..

describe at least five ways in which Information Technology can help students studying subject other than computing ​

Answers

Answer:

‘Computer Science’ and ‘information technology’ are completely different subjects. Information Technology (IT) is-

(i) the study,

(ii) design,

(iii) development,

(iv) implementation, and

(v) support or management

of computer-based information systems, particularly software applications and computer hardware.

Information Technology (IT) deals with the use of electronic computers and computer software to-

(i) convert,

(ii) store,

(iii) protect,

(iv) process,

(v) transmit, and

(vi) securely retrieve information.

Shortly, information technology (IT) itself means learning to use technology in business or in studies of some subject matter using technology.

Hence, IT could help students studying subjects other than computing with the above mentioned points considered.

What is the purpose of the CC option in an email?
A.
Create a carbon copy of the message.
B.
Save the message as a template for future use.
C.
Send a copy of the message to one or more people.
D.
Forward a message to multiple recipients.
( Edmentum MSE )

Answers

Answer:

c

Explanation:

send a copy of the messege

what type of dedicated cryptographic processor that provides protection for cryptographic keys?

Answers

A Hardware Security Module (HSM) is a dedicated cryptographic processor that provides protection for cryptographic keys.What is a Hardware Security Module (HSM)?Hardware Security Module (HSM) is a specialized computing device with the primary purpose of managing and securing cryptographic keys.

HSM is a highly secure computer that is responsible for cryptographic key storage, protection, and encryption/decryption. It is a computer designed to safeguard and manage digital keys for a strong authentication process. They generate, store, and protect digital certificates and encryption keys that protect sensitive data and authenticate transactions.HSMs are mostly used to secure transactions and sensitive data. They are used to store cryptographic keys, maintain them in a secure environment, and encrypt and decrypt data that flows through the network.

The purpose of an HSM is to manage digital keys and perform encryption and decryption in a highly secure environment. They can be deployed in various scenarios, including financial transactions, identity verification, and sensitive data encryption and decryption. They can be integrated with existing systems and applications to offer advanced security features that meet industry standards and compliance requirements.In conclusion, an HSM is a dedicated cryptographic processor that provides protection for cryptographic keys.

To know more about Security visit:

https://brainly.com/question/32133916

#SPJ11

Compare the different specialties of video game design in which a video game designer can concentrate.

Answers

Answer:

design animators, visual effects, 3d animators

Explanation:

You need both designers and programmers.

Answer:

A game can't be created without both the designer and programmer working closely together from start to finish. Game designers are responsible for the overall creative vision of the game while programmers have the technological know-how to implement the game designers' ideas and bring them to life using computer code.

Explanation:

:)

pa 11-3 (static) kooyman hardware sells a ladder. they had... kooyman hardware sells a ladder. they had 5 ladders at the start of the week but demand was for 6 ladders.
What was their fill rate for this ladder?

Answers

The fill rate for a product is the percentage of demand that is met with available inventory.

In this case, Kooyman Hardware had 5 ladders at the start of the week and demand was for 6 ladders. Since they did not have enough inventory to meet the entire demand, the fill rate would be:

(fill rate) = (quantity filled) / (demand) * 100%

(quantity filled) = 5 ladders (since that is all they had)

(demand) = 6 ladders

(fill rate) = 5/6 * 100% = 83.33%

Therefore, Kooyman Hardware's fill rate for this ladder was 83.33%.

For more questions like hardware visit the link below:

https://brainly.com/question/29857377

#SPJ11

Firewalls produce ________ that include lists of all dropped packets, infiltration attempts, and unauthorized access attempts from within the firewall.

Answers

Firewalls produce ________ that include lists of all dropped packets, infiltration attempts, and unauthorized access attempts from within the firewall.

The answer is Activity logs

A user has multiple web pages open and is using email. Which layer of the Transmission Control Protocol/Internet Protocol (TCP/IP) model is responsible for sorting the data to send email and web pages to the appropriate location?
a) Transport
b) Network
c) Data link
d) Application

Answers

Answer:

This is the second question like this I've seen. They aren't the greatest.

Explanation:

The question is not good. The answer would be option a, Transport even though it doesn't make a whole lot of sense when you really go into detail.

It could also be option d, Application but I think they're going for the first.

Other Questions
The nurse provides education to the parent of an infant being treated for hydrocephalus with a ventriculoperitoneal (VP) shunt. Which statement by the parent indicates the need for further instruction A source vibrating at constant frequency generates a sinusoidal wave on a string under constant tension. If the power delivered to the string is quadrupled, by what factor does the amplitude change?. What are 3 exclusive powers for the Senate? of the elements below, two are much more abundant in earth's crust than in living organisms. what are these two elements? find area 10.7cm 15.1cm 18.4cm use a=h(base1+base2) What occurs as blocks of ice breaking from the front of a receding glacier become buried deposited sediment? Air America has a policy of booking as many as 15 persons on an airplane that can seat only 14. (Past studies have revealed that only 85% of the booked passengers actually arrive for the flight.) Find the probability that if Air America books 15 persons, there will be enough seats will be available. [tex]what \: is \: \frac{6}{5} \times \frac{3}{7}[/tex]Write your answer as a fraction in simplest form if 6 people can walk 12 dogs, how many people are needed to walk 24 dogs The process of drawing districts with the intent of pressing partisan advantage at the expense of other considerations is known as ______. True or False: Fibers are easily matched/identified in a criminalinvestigation and always aid in catching criminals? FREE BRAINLIEST! if you can answer this correctly ill give you brainliest and answer some of the questions you have posted :) thank you very much!!! (22pts) what is 3/5 divide 1/3 Jesse is helping his grandmother plant a garden in the shape of the trapezoid shown below. What is the area, in square feet, of this garden? a 37.125 b 74.25 c 40.5 d 258.75 Can anybody help me find the right answer? Solve for x in the equation x2 + 4x-4-8.O x= -6 or x = 2O x=-2+2V2O x = -2 or x = 6O x=2+25 Solve for the missing length and the other two angles in the triangle below. Which of the two forces is greater the force on the firefly or the force on the bus explain your answer please I really need help pleaseIts due today please Because of past treatment and issues what is common problem today among the aboriginal TanzaniaWhat the central bank should do in case of unexpected increase in unemployment? Monetary policy that the central bank should introduce. positive negative side effects of itwhat are the effects of unexpected unemployment increase on different sectors?