write an algorithm to print the odd number from 100 to 1​

Answers

Answer 1

Answer:

In python:

for x in range(0,100):

   if x % 2 == 1:

       print(x)


Related Questions

#9: A persistent store of organized data useful for storing large quantities of data with a user-friendly method of retrieval is called: (A) The Home button (B) a worksheet (C) a database (D) a workbook
#10: Which type of database uses just one table to store data? (A) Flat File (B) Relational (C) Database interaction (D) Query
#11: Which of the following uniquely identifies one entity (object, person, thing) in a table? (A) Query (B) Record (C) Field (D) Schema
#12: The logical way tables are linked is known as the database: (A) Access (B) Primary Key (C) Schema (D) Justification
#13: Which of the following is the field that uniquely identifies a record? (A) Primary Key (B) Schema (C) Number (D) Table Link
#14: Requests to retrieve data written in a language such as SQL are called? (A) Numbers (B) Data (C) Databases (D) Queries
#15: The database program for Microsoft Office is called: (A) Access (B) MS Databases (C) Obvibase (D) Queries
PLEASE ANSWER RIGHT ANSWERS DONT ANSWER JUST FOR POINTS I RLLY NEED THIS

Answers

i wish i could help but sound difficulty. so i hope you pass

Three(3) methods available for processing traffic identified only as: unknown-tcp
unknown-udp
unknown-p2p
web-browsing

Answers

It is important to note that these methods can be used in combination to achieve greater accuracy and reliability in traffic identification and classification.

The three methods available for processing traffic identified as unknown-tcp, unknown-udp, unknown-p2p, and web-browsing are:

Deep packet inspection (DPI): This method involves analyzing the contents of packets in real-time to identify the application generating the traffic. DPI can identify and classify traffic based on application-level protocols, including unknown protocols, which allows the administrator to enforce appropriate policies.

Port-based filtering: This method involves blocking or allowing traffic based on the TCP/UDP ports used by the applications. However, some applications can use non-standard ports or even dynamic ports, which makes it difficult to classify traffic based on port numbers.

Behavioral analysis: This method involves analyzing the traffic behavior of applications to identify and classify them. Behavioral analysis can identify patterns such as the size of packets, timing, frequency, and protocol structure, to accurately identify unknown protocols. This method is especially useful for identifying unknown-p2p traffic, which can be challenging to classify using other methods.

To know more about TCP/IP,

https://brainly.com/question/30114641

#SPJ11

When looking to ensure your website is easily accessible by mobile users, what should you focus on doing first

Answers

Answer:

There are may steps in this procedure but there few steps that do first to access your mobile with your website.

Explanation:

When we are looking in our website and easily accessed by the mobile users, It is easy for them.

There are certain steps that should do first.

First step is that you have to redesign the website color schemeTo optimize your websiteTo create the mobile appNow to shorten the content in website.

Linux operating systems should not be modified once the installation is complete.

Answers

Linux operating systems are designed to be highly customizable and flexible, allowing users to tailor their system to their specific needs. However, it is generally not recommended to modify the core components of the operating system once the installation is complete. This is because any modifications to the system can potentially introduce instability or security vulnerabilities, and can also make it more difficult to receive updates and support from the Linux community.

Instead, users should focus on installing additional software packages or customizing the user interface without making fundamental changes to the underlying operating system. It is also important to keep the system up-to-date with security patches and software updates, which can help to mitigate any potential vulnerabilities or issues. Overall, while Linux offers a high degree of flexibility, it is important to use caution when making modifications to ensure the stability and security of the system.

It's important to clarify that the statement "Linux operating systems should not be modified once the installation is complete" is not entirely accurate. In fact, Linux systems are designed to be flexible and customizable, allowing users to modify, update, and enhance them as needed. This can be done through package management systems, software updates, security patches, and system configuration adjustments, all of which contribute to the ongoing maintenance and improvement of a Linux operating system.

To know more about Linux operating systems visit:-

https://brainly.com/question/29798420

#SPJ11

3 things in terms of photography to learn about.

Answers

The three important principle in photography are;

Light Subject and Composition.

What is the explanation for these terms?

Photography is about light. Without it, you couldn't even take images, let alone excellent ones.

The quality of light varies from one to photograph, yet it is always what gives your photographs their underlying structure. It doesn't get any more basic than that.

Most of us snap photos because something catches our attention.

Unsurprisingly, that "something" is your subject.

If you're explaining a photograph to someone else, the topic is most likely the first thing you'll mention.

Finally, the composition is the third and most important aspect of every shot.

Simply said, composition is the arrangement of the things in your shot. It includes your camera position, the connections between photo elements, and the things you accentuate, deemphasize, or altogether eliminate. Composition is the method through which you communicate your tale.

Learn more about photography:
https://brainly.com/question/30685203
#SPJ1

Which keyboard shortcut is used to access the memorized transaction list?
a. shift + T
b. ctrl + T
c. ctrl + shift + T
d. alt + T

Answers

The keyboard shortcut used to access the memorized transaction list is alt + T. Therefore, option D is correct.

Keyboard shortcuts are combinations of keys on a keyboard that provides quick access to specific functions or commands in various software applications, operating systems, or web browsers. They are designed to save time and improve productivity by allowing users to perform tasks without relying solely on the mouse.

Keyboard shortcuts can vary depending on the software or application being used. Some applications provide a list of available keyboard shortcuts within their menus or documentation.

Learn more about keyboard shortcuts, here:

https://brainly.com/question/30630407

#SPJ4

read and choose the correct option. the airport has large windows. what do the windows allow people to do as they wait for their flight?

Answers

The question asks about the purpose of the large windows in an airport.

The large windows in an airport allow people to do various things as they wait for their flight. They can enjoy the natural light and view of the outside, watch planes take off and land, and people-watch. The windows also provide a sense of openness and spaciousness in the airport.

In conclusion, the large windows in an airport serve multiple purposes, including providing natural light, views, and a sense of openness. They allow people to relax and pass the time while waiting for their flight.

To learn more about airport, visit:

https://brainly.com/question/2091004

#SPJ11

Complete the missing part of the line to allow you to read the contents of the file.
inFile = ____ ('pets.txt','r')

Answers

Answer: Sorry I’m late but the answer is open

Explanation: Edge 2021

The missing part of the line allows you to read the contents of the file. inFile = Open ('pets.txt','r').

What is the file format?

The term file format refers to that, A standard way the information is encoded for storage in a computer file. It specifies how bits are used to encode information in a digital storage medium. File formats may be either proprietary or free.

The file format is the structure of that file, Which runs a program and displays the contents. As there are many examples like a Microsoft Word document saved in the. DOC file format is best viewed in Microsoft Word. Even if another program can open the file.

Therefore, By the File format allows you to read content and can open up the file format.

Learn more about  file format here:

https://brainly.com/question/1856005

#SPJ2

What tips should you consider when vacationing somewhere with a culture different than yours? When have you used these tips in your own photography practice? If you have not traveled outside of your home area, describe a place you’d like to go photograph and how these tips might apply there.

Answers

Answer:

When vacationing anywhere out of home city, county, or state, Abide by all laws, always set up space for you (space that others recognize as yours), and most importantly, DO NOT TAKE PICTURES OF ANYONE WITHOUT CONSENT (this also means picture near people, they can get the wrong idea) if you don't speak the language of the people of the country you are going to, do some language practice, bring a translator, and also someone who you know is familiar with that language.

Explanation:

Digital literacy involves having a current knowledge and understanding of computers, mobile devices, the internet, and related technologies. group of answer choices
a. true
b. false

Answers

Digital literacy involves having a current knowledge and understanding of computers, mobile devices, the internet, and related technologies is option b: false statement.

What is meant by digital literacy?

Digital literacy is known to be a term that connote when a person is said to be having the skills that they need to live, learn, as well as work in a society where communication as well as access to information is known to be  increasingly via the use of digital technologies such as internet platforms, social media, and others.

Therefore, Digital literacy involves having a current knowledge and understanding of computers, mobile devices, the internet, and related technologies is option b: false statement.

Learn more about Digital literacy from

https://brainly.com/question/11983600

#SPJ1

The company generates a lot of revenue and is rapidly growing. They're expecting to hire hundreds of new employees in the next year or so, and you may not be able to scale your operations at the pace you're working.

Answers

Answer:

The most appropriate way to deal with the situation presented above is to acquire more space at the current office site at additional rent beforehand.

Explanation:

The Scaling of a revenue-generating business is a crucial task in which a lot of pre-planning and thinking is required.

In order to scale the business in the next year, the planning of it is to be carried out at the moment and proper necessary arrangements are ensured. These steps could be one from:

Looking for bigger spaces for renting for a full shift of the operationsLooking for a site office for an additional officeAcquiring more space in the current office site.

This process would result in acquiring a bigger place beforehand but in order to mitigate the risk, try to keep the place in view by providing them a bare minimum advance for the additional units.

Using existing algorithms as building blocks for new algorithms has all the following benefits EXCEPT
A. reduces development time
B. reduces testing
C. simplifies debugging
D. removes procedural abstraction

Answers

Answer:

I think it’s D

Explanation:

Using existing correct algorithms as building blocks for constructing another algorithm has benefits such as reducing development time, reducing testing, and simplifying the identification of errors.

Removal of procedural abstraction is not a benefit of using an existing algorithms as a building blocks for new algorithms.

An algorithm refers to a set of instructions which are coded to solve a problem or accomplishing a task.

The use of existing and correct algorithms as building blocks for constructing another algorithm has the benefits of

reducing development timereducing testingsimplifying the identification of errors.

Hence, the removal of procedural abstraction is not a benefit of using an existing algorithms as a building blocks for new algorithms.

Therefore, the Option D is correct.

Read more about existing algorithms

brainly.com/question/20617962

6.4 code practice(project stem) - What is the code for this problem?

6.4 code practice(project stem) - What is the code for this problem?

Answers

Based on the nested diamonds using the given code structure. Here's an example implementation that creates nested diamonds:

How to depict the code

import simplegui

def draw_handler(canvas):

   # Constants for diamond size and spacing

   SIZE = 50

   SPACING = 20

   

   # Calculate the center point of the canvas

   center_x = canvas.get_canvas_width() / 2

   center_y = canvas.get_canvas_height() / 2

   

   # Draw the nested diamonds

   for i in range(5):

       diamond_size = SIZE + i * SPACING

       diamond_offset = (SIZE + SPACING) * i

       

       # Top-left diamond

       canvas.draw_polygon([(center_x - diamond_size - diamond_offset, center_y),

                            (center_x - diamond_offset, center_y - diamond_size),

                            (center_x + diamond_size - diamond

Learn.more about code on

https://brainly.com/question/26134656

#SPJ1

does trend in computing important for organization management?explain​

Answers

Answer:

Yes

Explanation:

Trend analysis can improve your business by helping you identify areas with your organisation that are doing well, as well as areas that are not doing well. In this way it provides valuable evidence to help inform better decision making around your longer-term strategy as well as ways to futureproof your business.

The main advantage of a solid state drive is:
Group of answer choices

They can store more information.

They spin faster.

They are less likely to be damaged.

They are less expensive.

Answers

the answer is they can store more information

A(n) ________ engine is a specialized program that assists you in locating information on the web and the internet. group of answer choices micro search wiki cloud

Answers

A Search engine is a specialized program that assists you in locating information on the web and the internet.

What is a Search engine?

This is known to be a kind of a Software type.

A search engine is  also seen to be a type of a software system that is known to be designed to function or work out web searches.

Note that They tend to  search the World Wide Web in a way that is systematic in nature  for specific information that is said to be specified in a textual web search query.

Therefore, based on the definition given, one can say that A Search engine is a specialized program that assists you in locating information on the web and the internet.

Learn more about Search engine from

https://brainly.com/question/512733

#SPJ1

Which three events occur when a DNS request is processed?
A. A local DNS server sends the IP address back to the requesting
device for access.
B. A local DNS server checks to see if it knows the IP address for the
site requested.
C. A subdomain DNS server defines how data will be transferred
over the internet.
D. Top-level domain DNS servers look up the site and return the IP
address.

Answers

The three events occur when a DNS request is processed is that

A local DNS server sends the IP address back to the requesting device for access. A local DNS server checks to see if it knows the IP address for the site requested.Top-level domain DNS servers look up the site and return the IP address.What are the types of DNS queries?

There are known to be 3 types of DNS queries which are:

Recursive iterativenon-recursive.

Therefore, The three events occur when a DNS request is processed is that

A local DNS server sends the IP address back to the requesting device for access. A local DNS server checks to see if it knows the IP address for the site requested.Top-level domain DNS servers look up the site and return the IP address.

Learn more about DNS from

https://brainly.com/question/12465146

#SPJ1

Which factor is NOT used to determine who can be let go during a downsizing?
a. Seniority
b. Level of Income
C. Gender
d. Department

Answers

It’s C- gender. Hope this helped!
the answer is c. Gender

Ballet was originally created for the wedding celebration of Louis XVI and Marie Antoinette. (True or False)

Answers

Answer:

true

Explanation:

Based on what you know about the Sort and Find functions, return to the database file to determine the answers to the following questions.

In which year did most people update their contact information?

1988

2010

2011

2012

Answers

Answer:

2010

Explanation:

Most of the people updated their information in the database in the year 2010. The database files have different functions which enable the sorting of data according to the contact information with year wise filter.

Answer:

It’s 2012

Explanation:

You can place the line continuation symbol __ at the end of a line to tell the interpreter that the statement is continued on the next line.

Answers

Answer:

absolutely

Explanation:

Answer: "\"

Explanation: This is the symbol for the continuation line.

Recall that a floating-point number can be expressed as (−1)s(1+f)2e where s,f and e are binary numbers. Recall that s is the sign indicator, f the mantissa (or fractional part), and e the (signed) exponent. Suppose the sign is 1 bit long, the mantissa 24 bits long, and the exponent has 9 bits. What are the largest and smallest positive numbers in this computer system? Provide the theoretical expressions for the decimal version of the largest and smallest numbers, and also use Matlab to evaluate the expressions.

Answers

The largest positive number is 3.4028 x \(10^{38\) and the smallest positive number is 1.1755 x \(10^{-38\).

A floating-point number can be expressed as (-1)^s * (1+f) * 2^e, where s, f and e are binary numbers. Here, s is the sign indicator, f is the mantissa (or fractional part), and e is the (signed) exponent. If the sign is 1 bit long, the mantissa is 24 bits long, and the exponent has 9 bits, then the largest and smallest positive numbers in this computer system are as follows:Largest positive number: When all the bits are used for the mantissa and exponent, the value of f and e will be 2^24-1 and 2^9-1 respectively. This will give us the largest possible number in this computer system, which can be expressed as: (theoretical expression). Using Matlab, the expression can be evaluated as follows:>>ans = 3.4028e+38Smallest positive number: When all the bits are used for the mantissa and exponent, the value of f will be 1 and e will be -126 (the smallest possible exponent value). This will give us the smallest possible number in this computer system, which can be expressed as: (theoretical expression). Using Matlab, the expression can be evaluated as follows:>>ans = 1.1755e-38

Therefore, The largest positive number is 3.4028 x \(10^{38\) and the smallest positive number is 1.1755 x \(10^{-38\).

Learn more about Matlab :

https://brainly.com/question/33325703

#SPJ11

convert the following decimal number to its equivalent binary ,octal,hexadecimal 1920​
pls in step by step
pls help me bro

Answers

Answer:

0b11110000000 is binary

0o3600 is in octal

0x780 in hexa dec.

Explanation:its a bit complitcated to explain sorry bro!

[1+4)

OR

Subtract (11100), from (11110), by using I's and 2's complement method.

Answers

To subtract (11100) from (11110) using I's and 2's complement method, we first need to convert both numbers into their 2's complement form.

The 2's complement of a binary number is obtained by inverting all the bits and adding 1 to the least significant bit.
For (11100), we first invert all the bits to get (00011), and then add 1 to the least significant bit to get (00012). So the 2's complement of (11100) is (00012).  Similarly, the 2's complement of (11110) can be obtained by inverting all the bits to get (00001), and adding 1 to the least significant bit to get (00002). So the 2's complement of (11110) is (00002).


In conclusion, the subtraction of (11100) from (11110) using the 2's complement method is achieved by first finding the 2's complement of the number to be subtracted and then adding it to the original number. After performing the addition and ignoring any carry-out bit, the final result is obtained by adding 1 to the sum. In this case, the result is (10).

To know more about complement visit:

https://brainly.com/question/21512303

#SPJ11

Next → Creating Documents Using Word Processing Software: Mastery Test
1
Type the correct answer in the box. Spell all words correctly.
Under which key category do the Page Up and Page Down keys fall?
Page Up and Page Down keys fall under the
Reset
keys category.
Next

Answers

Any of these approaches can be used to open a Word document that already exists. Although a doc file will open when double-clicked in Windows Explorer.

What exactly is word processing software?

The process of creating, editing, saving, and printing documents on a computer is referred to as word processing. Specialized software, also referred to as a word processor, is required in order to execute word processing. Microsoft Word is one example of a word processor, while many people also use other word processing programs.

Does Excel have a word-processing component?

MS Excel is a spreadsheet application used to create tables, and charts, and perform intricate computations. Microsoft Word is a word processing tool used for producing papers, reports, and other written work.

to know more about Word Processing here:

brainly.com/question/29762855

#SPJ1

areas in which there has been significant technological advancement (electricity, transportation, communication, etc.)?

Answers

Answer:

transportation,communication,health care and agriculture

Explanation:

transportation through the provision of vehicles

comminication through the use of mobile

phones and laptops

health care through the use of machines and incubators

agriculture through the use of tractors and fertilizers

a program design tool used to list the attributes and methods of objects within an object-oriented program is called .

Answers

A program design tool used to list the attributes and methods of objects within an object-oriented program is called a UML (Unified Modeling Language) class diagram.

In a UML class diagram, classes are represented as boxes with the class name at the top, followed by the attributes in the middle and the methods at the bottom. Attributes are depicted as variables and are listed within the class with their respective data types. Methods, on the other hand, are depicted as operations and are listed below the attributes.  It is a type of static structure diagram that provides a graphical representation of the classes, interfaces, objects, and their relationships and structures in an object-oriented system.

Class diagrams can be used to depict the structure of an object-oriented system, its classes and their relationships. It can also be used to represent the relationship between objects, such as inheritance and association. Inheritance is represented by a solid line with an arrow pointing to the superclass, while association is represented by a solid line connecting the two classes.

UML class diagrams provide a visual representation of the objects and their relationships, making it easier for developers to understand the structure of the system. It also helps in identifying potential design problems early in the development process, reducing the need for costly and time-consuming changes later on.

To know more about program design tool: https://brainly.com/question/30320114

#SPJ4

true or false: most email marketers recommend that email address collection be "opt-out" and require an action like clicking on a check box to be unsubscribed to emails

Answers

It is TRUE to state that most email marketers recommend that email address collection be "opt-out" and require action like clicking on a check box to be unsubscribed to emails

What is email marketing?

Email marketing is a way for businesses to send promotional messages or advertisements to a large group of people through email. These emails can be sent to a list of email addresses that the business has collected from customers, website visitors, or other sources.

The goal of email marketing is usually to get people to take a specific action, such as visiting a website, making a purchase, or signing up for a service.

To create an email marketing campaign, a business will typically write and design an email, then send it to a large group of people using an email marketing service. This service can help the business track the success of the campaign and make it easier to send emails to a large group of people all at once. Email marketing is a popular way for businesses to reach out to their customers and promote their products or services.

Learn more about Email Marketing:
https://brainly.com/question/29649486
#SPJ1

A type of sensor used to detect which way around a device is being held. ​

Answers

There’s 3 main ones accelerometer, gyroscope, and magnetometer.

what's the 111st element of a sequence that starts at 1.2 and increments by .3?

Answers

Answer:

34.2

Explanation:

To find the 111st element of the sequence that starts at 1.2 and increments by 0.3, we can use the formula for the nth term of an arithmetic sequence:

an = a1 + (n - 1)d

where:

an = the nth term of the sequence

a1 = the first term of the sequence

d = the common difference between terms (in this case, 0.3)

n = the term number we want to find

Substituting the given values, we have:

a111 = 1.2 + (111 - 1)0.3

a111 = 1.2 + 33.0

a111 = 34.2

Therefore, the 111st element of the sequence that starts at 1.2 and increments by 0.3 is 34.2.

Other Questions
Fe2+(aq)+Zn(s)Fe(s)+Zn2+(aq)Ecell=+0.32VA galvanic cell generates a cell potential of +0.32V when operated under standard conditions according to the reaction above. Which of the following pairs of conditions are needed to construct a similar cell that generates the lowest cell potential?A[Zn2+]=0.5M and [Fe2+]=1M because Q1.C[Zn2+]=2M and [Fe2+]=0.5M because Q>1.D[Zn2+]=2M and [Fe2+]=1M because Q Rewrite the following statements using set notation, and then describe each set by listing its members. (a) A is the set of natural numbers greater than 107 and smaller than 108. Answer: At the outset of the COVID-19 pandemic the demand for face masks increased markedly around the globe resulting in retailers. In addition, the sales of hand sanitisers, personal protective equipment (PPE) and cleaning and fumigating and similar products swelled across several international markets since the COVID-19 outbreak began in March 2020. According to data released by Grecques Consulting Pty, an international research firm based in the US, face masks sales grew by a year-on-year increase of 400% in April 2020. However, in December of 2020, the price of face masks retraced back to its pre- COVID-19 level. 5.1 (10 marks) With the aid of diagrams, critically evaluate changes in the market type for the face masks industry post the initial COVID-19 shock in March 2020. 5.2 (10 marks) Critically discuss how price elasticity of demand of face masks was affected, including its impact on revenue at the outset of the pandemic relative to the later in that year, when the price of masks returned to its pre- COVID-19 level. What is the area of the figure?Enter your answer in the box.in2 New product and service innovation is important because the longer a product or service exists in a given marketplace, the more likely that the market will become Blank______. Match the graph with the correlation strength.1. Perfect Positive Correlation2. Strong Positive Correlation3. Moderate positive correlation 4. Wake positive correlation 5. No correlation Is the following question a strong research topic? "Is it easy to be an actor?"A. No, it is too broadB. No, it is too narrowC. No, it is too subjectiveD. YesReset Selection President Biden claims he can use the 2003 HEROES Act to forgive Federal student loans because the pandemic created similar economic conditions to 9/11. Is he right or is this action an improper expansion of presidential powers? Explain. Aside from claiming land for Spain, what was the purpose of Ferdinand Magellan's voyage in 1519? A. to be the first explorer to successfully circumnavigate the globeB. to enhance commercial ties previously established by Vasco da GamaC. to explore the coast of Africa and sail around itD. to prove one could sail to Asia by way of South America instead of Africa 1. Which statement is true of southern France during World War II? *1 pointIt officially remained independent.Its government was based in Paris.It was occupied by the German army.Its government firmly refused to cooperate with the Nazis. __ scanning involves taking a photo of the colored part of the eye and comparing it to a database of images. what is A? plsssss helppppp I need help ASAP The angle measures of a triangle are shown in the diagram. 50 les (3x - 10) What is the value of x? F25 G 20 H 10 ) 28 search C Consider the following situation: Sweet Springs Candy Shop sold 2 pounds of chocolates for $9.98 and 5 pounds of chocolate for $24.95.A. Is the relationship between the number of pounds of chocolate and the total cost proportional? B. Why or why not? What part does the ocean play in the water cycle? Lana and Jeff each randomly surveyed 15 students about their favorite types of movies. Are these samples representative of the school population? Explain.No, the samples are not large enough to be representative.Yes, both samples are random, so they are representative.No, the samples might include some of the same people, so they are not representative.Yes, the samples do not include the same people, so they are representative. Resource providers use accounting information to identify companies with high earnings potential because those companies are better able to ______. Write a program that achieves the concept of thread using extends of thread or implements runnable then achieve synchronize for one function Display your finished works. Include a short explanation.crayons. The price of a gallon of unleaded gas was $2.88 yesterday. Today, the price fell to $2.82. Find the percentage decrease. Round your answer to the nearest tenth of a percent.