Which is to ask a user to create a variable named $password with a value 12345?

Answers

Answer 1

To ask a user to create a variable named $password with a value 12345, the code `` can be used.

Variables are used in PHP to store values in memory. A variable in PHP is a name that represents a value. Variables are used in PHP to store data, such as strings of text, numbers, and arrays. Variables in PHP start with a `$` sign, followed by the name of the variable.

The `$` sign tells PHP that the following word is a variable. Here's an example of how to create a variable named `$password` with a value of `12345`:``After the above code is executed, the `$password` variable will contain the value `12345`.

Learn more about PHP at:

https://brainly.com/question/14757990

#SPJ11


Related Questions

Automated Deployment is one of the prerequisite for DevOps Implementation.1. True2. False

Answers

True I think………………………..

Automated Deployment is one of the prerequisite for DevOps Implementation is a true statement.

Automated deployment

Automated deployment provides the ability to move your software between testing and production environments by using automated processes.

In other words, it allows organizations to release new features faster and more frequently.

Automated deployment allows faster approach to development, production  and deployment.

learn more on automated deployment: https://brainly.com/question/17052494

#SPJ2

Which among the following is a fraudulent or deceptive act designed to trick individuals into spending time or money for little or no return?
A. Internet scams
B. Data manipulation
C. Theft
D. Malicious programs

Answers

Answer:

A. Internet scams.

Explanation:

Internet scams is a fraudulent or deceptive act designed to trick individuals into spending time or money for little or no return through the use of a cloud service or the internet. Some examples of an internet scam are phishing scams, email spams, credit card scam, etc. It is simply centred around the provision of false information or misrepresentation of another party for the sole purpose of theft.

Hence, an internet scam is an illegal means of obtaining things from people and such is a cyber crime that is punishable by law.

James Quinn (1991) defines strategy as the pattern that integrates an organization’s major goals, policies and actions into a cohesive whole.

What are the criteria for a good strategy?

List and discuss five different criteria.

(1 mark for each criteria and 1 mark for the corresponding and relevant discussion)

Answers

A good strategy should meet the following criteria: clarity, consistency, feasibility, flexibility, and alignment.

Clarity means that the strategy should have a clear and well-defined purpose and direction, ensuring that everyone understands it. Consistency implies that the strategy should be aligned with the organization's goals and policies, creating a coherent and integrated approach. Feasibility means that the strategy should be realistic and achievable within the organization's resources and capabilities. Flexibility suggests that the strategy should be adaptable to changes in the internal and external environment, allowing for adjustments when needed. Alignment emphasizes the importance of aligning the strategy with the organization's culture, values, and stakeholders' expectations.

In summary, a good strategy should be clear, consistent, feasible, flexible, and aligned with the organization's goals, policies, and stakeholders' expectations. These criteria ensure that the strategy can effectively guide the organization towards its major goals and actions.

You can learn more about strategic criteria at

https://brainly.com/question/29340760

#SPJ11.

A mobile device has poor performance and is slow to respond to screen inputs. After troubleshooting, a technician decides to perform a factory reset.
Which of the following actions should a technician take before doing so?
Perform a remote wipe to clear any personal data.
Close all running applications.
Ensure that the battery is fully charged.
Back up all data to an attached computer or a cloud backup service.

Answers

Before performing a factory reset on a mobile device to address poor performance and slow responsiveness, a technician should take the action of backing up all data to an attached computer or a cloud backup service.

Performing a factory reset on a mobile device erases all data and restores it to its original factory settings. It is a drastic step that should be taken with caution, as it will result in the loss of all personal data and settings on the device. Therefore, it is important to back up all data before proceeding with the factory reset.

Backing up the data ensures that important files, contacts, messages, and other personal information are preserved and can be restored after the reset. This can be done by connecting the device to a computer and transferring the data or using a cloud backup service to store the data remotely.

The other options provided in the question, such as performing a remote wipe, closing all running applications, and ensuring a fully charged battery, are also important considerations in certain situations. However, when specifically preparing for a factory reset, the most critical step is to back up all data to prevent permanent loss and enable the restoration of essential information once the reset is complete.

Learn more about cloud backup service here:

https://brainly.com/question/29543801

#SPJ11

(Maximum 400 words) Describe how this period of Coronavirus (COVID-19) will influence and affect the STEM (Science, Technology, Engineering, and Mathematics) fields.

Answers

The period of coronavirus will have both negative and positive impacts on STEM fields.

However, the STEM (Science, Technology, Engineering, and Mathematics) fields have shown significant changes and impacts.

Here is how this period of COVID-19 will affect the STEM fields.

1. Technology

The current situation has increased the use of technology in various fields. Remote work and online meetings are becoming more popular, and this has led to increased technology usage. Technological advancements are expected in the future, leading to new business models that are more efficient.

2. Biomedical research

The COVID-19 pandemic has sparked the need for more biomedical research and led to an increase in research funding. Scientists are researching vaccines, treatments, and diagnostic tools, which is expected to lead to a better understanding of viruses and other infectious diseases.

3. Education

The pandemic has affected the education system globally, with many institutions closing and students learning from home. Teachers and educators are now incorporating technology in teaching, and the pandemic has accelerated the adoption of e-learning platforms. This has led to the development of new ways to learn and teach, and new online learning platforms are expected to emerge in the future.

4. Engineering

The pandemic has led to an increase in demand for essential supplies such as ventilators, personal protective equipment (PPE), and other medical devices. This has led to the development of new designs and manufacturing processes that are more efficient. The need for innovation has also led to the development of new solutions, such as 3D printing of medical supplies.

5. Mathematics

Mathematical models are used to understand the transmission of diseases, and the COVID-19 pandemic has led to the development of new models to understand the spread of the virus. These models help policymakers and public health officials make decisions to control the pandemic.

In conclusion, the COVID-19 pandemic has impacted STEM fields significantly, leading to new developments and innovations. With increased technology adoption, biomedical research, e-learning platforms, and engineering, the STEM fields are expected to change and adapt to the new normal. It is crucial to keep up with these changes and find ways to take advantage of the opportunities presented by the pandemic.

learn more about STEM fields here:

https://brainly.com/question/30082530

#SPJ11

for addition of two unsigned short values, how many bits does the sum need for storage in order to prevent overflow?

Answers

Short is probably 16 bits on your system, so the range of values is -32768 to 32767. Since 20000 plus 20000 is greater than the maximum value, this results in overflow and undefined behavior.

What kinds of information can a byte hold?

A group of eight bits is a byte. The most fundamental unit is the bit, which can be either 1 or 0. A byte is not just 8 values between 0 and 1, but also 256 (28) different combinations (or permutations) from 00000000 to 11111111, for example. As a result, a decimal number between 0 and 255 can be represented by a single byte.

What kind of data are bits used to store in a computer?

Modern computers store all data as a sequence of ones and zeros, which we refer to as binary data. Binary digits, or "bits," are made up of ones and zeros. Data are stored in eight-bit blocks called "bytes" in modern computers.

To know more about overflow visit :-

https://brainly.com/question/14369388

#SPJ4

a server is assigned to clearing tables at a catered event and you notice she has a runny nose. you are under-staffed that day. what should you do

Answers

If a food worker has other symptoms such a runny nose, sneezing, cough, or congestion, they are still authorized to handle food and utensils as long as they wash their hands as needed and take care not to contaminate it.

Should I report to work while sick in the food industry?

This is totally inappropriate for someone who works in the food industry. Please stay at home or make alternative arrangements for cover because there is a good probability that you will infect many other people.

Why is it a good idea to let your management know if you have one of the big six diseases?

These diseases are extremely contagious, so if you think you may have been exposed, let your manager know and stay at home.

To know more about congestion visit :-

https://brainly.com/question/29357610

#SPJ4

1. Very short questions.(any four) 14)
a. Write down the working principle of a computer.​

Answers

Answer:

The answer is below

Explanation:

Computer System is widely known for its ability to perform its functions faster by giving out information.

The computer system operation follows certain principles, some of which are:

1. It makes use of the OPERATING SYSTEM to link the hardware and the software together, without it, the computer system is useless.

2. It works with INPUT DEVICES such as keyboards or stylus. Without input devices, there is no way humans can communicate with the computer system

3. It works with OUTPUT DEVICES such as monitors and speakers. Without output devices, there is no way computers can communicate or give back information to humans.

4. It works with the NETWORK such as LAN or WIFI to provides the sharing of data files to other users or computers. Without the network, the computer system can only work within certain spaces, with no way to share data or files with others far away.

how does standby preemption affect the router configured with the highest priority in the hsrp group? (select two.) answer if the active router fails and then regains service, it does not become the active router again when preemption is not enabled. if the standby router fails and then regains service, it becomes the active router if preemption is enabled. if preemption is disabled, the standby router takes over as the active router. if the active router fails and then regains service, it becomes the active router again if preemption is enabled. if the active router fails and then regains service, it becomes the active router again, regardless of whether preemption is enabled.

Answers

If the active router fails and then regains service, it does not become the active router again when preemption is not enabled. If the standby router fails and then regains service, it becomes the active router if preemption is enabled. The correct options are A and B.

What is HSRP group?

Multiple routers on a single LAN can share a virtual IP and MAC address that is set as the default gateway on the hosts using HSRP.

One router is designated as the active router and another as the standby router among the routers configured in a HSRP group.

When preemption is disabled, if the active router fails and then regains service, it does not become the active router again.

If preemption is enabled, the standby router becomes the active router if it fails and then regains service.

Thus, the correct options are A and B.

For more details regarding HSRP group, visit:

https://brainly.com/question/29646496

#SPJ1

current situation having to do with protection of privacy when using ICT

Answers

Answer:

keeping your things safe

Explanation:

you keep your things safe

Plotting in MATLAB
Use the code below to generate 4 arrays in Matlab, x1, y1, x2, y2
Generate 10 random numbers
x1 = 1:10;
y1 = round (100*rand (1, numel (x1)));
Generate interpolated data step= 100;
x2 = 0:1/step: max (x1);
y2 = spline (x1,y1,x2);
Design Goal: Plot both data sets in the same figure
(1) Generate a new figure with a grid
(2) Plot y1 vs x1 in BLUE, with LINEWIDTH 3 (x1 is on the x-axis, y1 is on the y-axis) (3) Plot y2 vs x2 in RED, with LINEWIDTH 2 (x2 is on the x-axis, y2 is on the y-axis) (4) Add a legend: Raw Data, Spline Fit Data
Submit: Submit a copy of your code and the plot AND the list of the ten numbers YOUR copy of Matlab produces that you use in the spline function (meaning, also provide as a list of numbers your y1 array)

Answers

The provided MATLAB code generates the required arrays and plot, and it also displays the list of ten random numbers used in the spline function.

Here's the MATLAB code to generate the arrays x1, y1, x2, and y2 as described:

% Generate 10 random numbers

numbers = randi([1, 100], 1, 10);

% Generate x1 and y1

x1 = 1:10;

y1 = round(numbers);

% Generate interpolated data

step = 100;

x2 = 0:1/step:max(x1);

y2 = spline(x1, y1, x2);

% Plotting

figure;

grid on;

hold on;

plot(x1, y1, 'b', 'LineWidth', 3);

plot(x2, y2, 'r', 'LineWidth', 2);

legend('Raw Data', 'Spline Fit Data');

xlabel('x-axis');

ylabel('y-axis');

title('Raw Data and Spline Fit');

% Display the generated numbers used in y1

disp('Numbers used in y1:');

disp(numbers);

Explanation:

The code generates 10 random numbers using the randi function and stores them in the variable numbers.

The arrays x1 and y1 are generated, where x1 contains the values from 1 to 10, and y1 is obtained by rounding the generated random numbers.

The interpolated data is generated by using the spline function with x1, y1, and x2. x2 is created with a step size of 1/step from 0 to the maximum value in x1.

A new figure is created, the grid is turned on, and both data sets are plotted on the same figure. The raw data is plotted in blue with a linewidth of 3, and the spline fit data is plotted in red with a linewidth of 2.

A legend is added to the plot, labeling the two data sets.

x-axis and y-axis labels are added, and a title is given to the plot.

The generated numbers used in y1 are displayed.

To know more about MATLAB code visit :

https://brainly.com/question/31502933

#SPJ11

What is a geostationary satellite and what makes them special.

Answers

Answer: See explanation

Explanation:

A geostationary satellite is a satellite above the equator at an altitude of 22300 miles. It should be noted that it revolves exactly the same way the Earth does.

It is essential as it is used in the provision of infrared and visible images about the surface of the Earth which in turn is used for oceanography and also to observe the weather. Examples are

Fengyun of China, Geostationary Operational Environmental Satellite of USA, Himawari of Japan etc.

Name the strengthening technique used to strengthen a steel headgear

Answers

The strengthening technique used to strengthen a steel headgear​  are:

By welding additional angle shape profiles.Make a beam-column joint that will exist between existing beam and an already existing column.

How do you strengthen a steel headgear?

Strengthening a steel headgear is known to be one that can be be attained by adding shear connectors as well as giving either a new concrete slab or the use of a new topping over an already made slab.

The act of Welding additional plates on the 2  sides of existing columns is known to be a good tool that is often used for strengthening. This technique has helped to boast the load bearing capacity of a given steel column.

Therefore, The strengthening technique used to strengthen a steel headgear​  are:

By welding additional angle shape profiles.Make a beam-column joint that will exist between existing beam and an already existing column.

Learn more about headgear​ from

https://brainly.com/question/24551579
#SPJ1

What are informational sessions?
courses in information technology available at community colleges
short talks where one or more people representing a business or industry discuss careers and answer questions
events where people representing a business or industry address the news media
O informal gatherings where students can discuss current events with professors

Answers

Answer:

A courses in information technology available at community colleges

Explanation:

Trust me

Which services enables users to access web sites by domain name instead of by IP address

Answers

The service that enables users to access web sites by domain name instead of by IP address is called Domain Name System (DNS). DNS is a hierarchical decentralized naming system that translates domain names into IP addresses.

When a user enters a domain name into their web browser, the browser sends a request to a DNS server to resolve the domain name into its corresponding IP address. The DNS server then responds with the IP address, which the browser uses to connect to the web site.DNS provides a user-friendly way to access web sites, as domain names are easier to remember and type than IP addresses. Additionally, DNS allows for the use of domain names that can be changed or updated without affecting the underlying IP addresses, making it more flexible and scalable than using IP addresses alone.DNS is an essential service that enables users to access web sites by domain name instead of by IP address, making the internet more user-friendly and accessible.

To learn more about IP address click the link below:

brainly.com/question/16011753

#SPJ4

traditional process is injection moulding and the
additive manufacturing process is laser material deposition.
please try to be a detailed as possible and include
all the points, appreciated.
b) considers the design considerations needed for using AM processes; and c) justifies suggested finishing techniques for the components. Your report should include the following: the advantages of Additive manufacturing processes (in terms of their ability to produce different components, with reference to the complexity that can achieve by redesigning them to suit Additive manufacturing. You should also consider reduction in lead times, mass and cost, and the ability to manufacture assembled product. The disadvantages of using Additive manufacturing processes compared to traditional manufacturing methods. This should consider the consequences of redesigning products/components, material choices, cost of capital equipment, and the volume of manufacture and process speeds. Design considerations including distortion, surface finish, support structures, and how Additive manufacturing can be linked to Computer Aided Design (CAD).

Answers

Additive Manufacturing (AM) processes, such as laser material deposition, offer advantages in terms of producing complex components, reducing lead times, mass, and cost, and enabling the manufacturing of assembled products.

However, there are also disadvantages to consider, including the need for product/component redesign, material choices, capital equipment costs, volume of manufacture, and process speeds. Design considerations for AM include distortion, surface finish, support structures, and integration with Computer-Aided Design (CAD).

Additive Manufacturing processes, such as laser material deposition, have several advantages over traditional manufacturing methods. One advantage is the ability to produce components with intricate designs and complex geometries that would be difficult or impossible to achieve with traditional processes like injection moulding. AM allows for freedom in design, enabling the optimization of components for specific functions and requirements.

AM processes also offer benefits in terms of reduced lead times, as they eliminate the need for tooling and setup associated with traditional methods. This can result in faster production cycles and quicker product iterations. Additionally, AM can reduce the overall mass of components by using only the necessary materials, leading to lighter-weight products. This can be advantageous in industries such as aerospace, where weight reduction is critical.

Cost savings can also be achieved with AM, particularly in low-volume production scenarios. Traditional manufacturing methods often involve high tooling and setup costs, whereas AM processes eliminate these expenses. Furthermore, AM allows for the production of assembled products with integrated features, reducing the need for manual assembly processes.

Despite these advantages, there are some disadvantages to consider when using AM processes. One drawback is the need for product/component redesign. AM often requires adjustments to the design to accommodate the specific capabilities and limitations of the chosen process. Material choices can also be limited in AM, as not all materials are suitable for additive processes. This can impact the functional properties and performance of the final component.

The cost of capital equipment for AM can be relatively high compared to traditional manufacturing machines. This can pose a barrier to entry for small-scale manufacturers or those with limited budgets. Additionally, AM processes may not be suitable for high-volume production due to slower process speeds and limitations in scalability.

Design considerations for AM include managing distortion during the printing process, achieving desired surface finish, and designing support structures to ensure proper part stability. Integration with CAD systems is crucial for leveraging the full potential of AM, as CAD software can aid in designing and optimizing components for additive processes.

In conclusion, while AM processes offer unique advantages such as complex geometries, reduced lead times, and cost savings in certain scenarios, there are also challenges to consider, including redesign requirements, material limitations, equipment costs, and process speeds. Design considerations for AM focus on addressing distortion, achieving desired surface finish, optimizing support structures, and utilizing CAD software for efficient design and optimization.

Learn more about Additive Manufacturing  here:

https://brainly.com/question/31058295

#SPJ11

Audiobook stores often have over a million different books
available for download. One audiobook reading of
The Picture of Dorian Gray is priced at $13.99 and received
180,000 downloads this year. A c
Audiobook stores often have over a million different books available for download. One audiobook reading of The Picture of Dorian Gray is priced at \( \$ 13.99 \) and received 180,000 downloads this y

Answers

The pricing and download data for an audiobook reading of The Picture of Dorian Gray can be analyzed to determine its revenue and popularity.

How can we analyze the pricing and download data to determine the revenue and popularity of The Picture of Dorian Gray audiobook?

The pricing of the audiobook reading of The Picture of Dorian Gray is set at $13.99 per download. With 180,000 downloads in a year, we can calculate the revenue generated by multiplying the price per download by the number of downloads: \( \$13.99 \times 180,000 = \$2,518,200 \).

This calculation reveals that the revenue generated from the audiobook reading of The Picture of Dorian Gray is approximately \$2,518,200 in a year.

Additionally, the number of downloads (180,000) indicates the popularity of the audiobook. This high download count suggests a significant level of interest and demand for The Picture of Dorian Gray among audiobook listeners.

Learn more about: revenue and popularity

brainly.com/question/9754592

#SPJ11

which advanced boot option starts windows, but loads only the drivers necessary for basic functionality

Answers

Answer:

The correct answer is: The Safe Mode

Explanation:

Safe Mode is an advanced boot option available in Windows. It is of two categories:

Safe Mode  and Safe Mode with Networking (this option allows inter and intra network conectivity)

It is useful for troubleshooting a windows operating system to find out why it is dysfunctional.

It can be activated by pressing the F8 key as the Windows Operting system boots up, but not after.

Cheers!

2.4 Code Practice: Question 1

Write the code to input a number and print the square root. Use the absolute value function to make sure that if the user enters a negative number, the program does not crash.

Answers

Answer:

num = float(input("Enter a number : "))

ab = abs(num)

sqrt = float(ab ** 0.5)

print(sqrt)

Explanation:

The National Archives is part of the federal government, which means that its content:

-belongs to everyone.

-is off limits to the public.

-comes with extreme licensing fees.

-is outdated and useless.

Answers

Answer:

its A

Explanation:

the national archives is open to anyone who visits

Write a function named count_case that takes a string as an argument and returns the count of upper case and lower case characters in the string (in that order). Any characters that are not letters should be ignored.

Answers

Answer:

def count_case(input): #create a function

 uppercase = 0 #declare variables

 lowercase = 0

 for x in input: #loop through user input looking at each letter

   if x.isupper(): #if letter is uppercase

     uppercase += 1 #increment the uppercase counter

   elif x.islower(): #otherwise if it is lowercase

     lowercase += 1 #increment the lowercase counter

 print(uppercase) #print uppercase count

 print(lowercase) #print lowercase count

string = input("enter string: ") #ask for user input

count_case(string) #run function

What is a small file deposited on a hard drive by a website containing information about customers and their web activities?.

Answers

Answer:

Cookies.

Explanation:

It is a small text file that a website can place on your computer's hard drive to collect information about your activities on the site or to allow the site to remember information about you and your activities.

Describe the major features of super computer

Answers

Answer:

large and operate at a high speed

A high speed low latency iterconnect
Large quantities of FLOPS (Floating Point Operations)
A large high throughput filesystem
The software infrastructure needed to write and run codes that utilize the system
Significant power and cooling infrastructure

What does a computer program use as a means to evaluate a condition as True or False?

Answers

Answer:

true

Explanation:

Answer:

A Boolean expression.

Explanation:

A Boolean expression is a logical statement that is either TRUE or FALSE . Boolean expressions can compare data of any type as long as both parts of the expression have the same basic data type.

which nosql database type stores each record and its associated data within a single document and also works well with analytics platforms?

Answers

The NoSQL database type that stores each record and its associated data within a single document is called a document-oriented database.

This type of database organizes data into documents, typically using formats like JSON or BSON. Document-oriented databases are well-suited for working with analytics platforms because they allow for flexible and efficient querying and indexing of data within a document.

Some popular examples of document-oriented databases are MongoDB and CouchDB.

In a document-oriented database, data is organized and accessed at the document level rather than through traditional table structures with rows and columns. Each document can have a different structure, allowing for flexibility in storing and querying data.

This makes document-oriented databases particularly suitable for handling unstructured or semi-structured data.

One of the main advantages of document-oriented databases is their ability to handle complex, hierarchical, and nested data structures with ease. The documents can contain nested arrays, key-value pairs, or even other documents, providing a natural representation for many real-world scenarios.

Additionally, document-oriented databases offer horizontal scalability, as they can distribute and replicate documents across multiple nodes in a cluster, providing high availability and fault tolerance.

For more such questions database,Click on

https://brainly.com/question/24027204

#SPJ8

What is present value for NPV?

Answers

The present value for NPV is the current worth of expected future cash flows.

NPV (Net Present Value) is a method for calculating the current value of expected future cash flows. It's a method that's frequently used in investment appraisal, capital budgeting, and business case development. NPV calculates the net present value of an investment, taking into account the time value of money and the cost of capital, among other factors. The formula for NPV is as follows:

NVP= CF0 + (CF1 / (1 + r)) + (CF2 / (1 + r)2) + ... + (CFn / (1 + r)n)Here,CF0 represents the initial cash flow,Cf1, CF2 ... CFn are future cash flows occurring at regular intervals, r represents the discount rate. In conclusion, the present value for NPV is the current worth of expected future cash flows.

To learn more about NPV, click here:

https://brainly.com/question/14697530

#SPJ11

which techniques should a technician utilize to achieve ha? (choose three.)

Answers

By implementing redundancy, load balancing, and failover mechanisms, technicians can achieve high availability.

To achieve High Availability (HA), a technician should utilize the following techniques:

Redundancy: Implementing redundancy involves having duplicate or backup components, such as servers, network devices, or storage systems, that can take over if the primary component fails.

Load Balancing: Load balancing distributes the workload across multiple servers or resources to ensure optimal performance and prevent overload on a single system.

Failover: Failover is the process of automatically switching to a backup or secondary system when the primary system fails.

To learn more on High availability click:

https://brainly.com/question/31978275

#SPJ4

you need to ensure that users can interact with all data for related records within a model-driven app form. what should you do?

Answers

Since you need to ensure that users can interact with all data for related records within a model-driven app form, the thing that you should  do is option A. Open a main form dialog.

What is the app about?

Model-driven apps offer a variety of choices for creating positive user experiences, such as:

options on an application-level.Options for organizing a site map.several choices for creating forms.

A form enables an app developer to create an app centered around table data and frequently necessitates working with and interacting with relevant entries from other tables.

The way a model-driven form is connected to the data is one crucial factor. Form controls that come pre-configured are linked to table fields. With more customisation, these controls are more flexible when using a form for various activities that require user input or where additional action is necessary before saving information, but they are less flexible when used to quickly build a form for creating and changing data.

Learn more about model-driven app form from
https://brainly.com/question/29354452

#SPJ1

See full question below

You need to ensure that users can interact with all data for related records within a model-driven app form.

What should you do?

Select only one answer.

A. Open a main form dialog.

B. Open a quick create form.

C. Display a quick view form.

D. Display a card form.

Employing the use of a(n)
will help you manage a STEM project.

Answers

Answer:

technicians

Explanation:

the answer is technicians. in my freshmen year we made flash cards and i still have them so i remember it.

Answer: technicians

Explanation:

my teacher told me and I passed so its right

Which loop prints the numbers 1, 3, 5, 7, …, 99?\


c = 1

while (c <= 99):
c = c + 2
print(c)

c = 1

while (c < 99):
c = c + 1
print(c)

c = 1

while (c <= 99):
print(c)
c = c + 2

c = 1

while (c < 99):
print(c)
c = c + 1

Answers

The loop that prints the numbers 1, 3, 5, 7, …, 99 is:

The Loop

c = 1

while (c <= 99):

   print(c)

   c = c + 2

This loop initializes the variable c to 1, then enters a while loop that continues as long as c is less than or equal to 99.

During each iteration of the loop, the value of c is printed using the print function, and then c is incremented by 2 using the c = c + 2 statement.

This means that the loop prints out every other odd number between 1 and 99, inclusive.

Read more about loops here:

https://brainly.com/question/19344465

#SPJ1

Other Questions
Please help I have a test on this tomorrow 50 points please help January February March Sales in units 15,400 20,800 18,400 Production in units 18,400 19,400 17,300 One pound of material is required for each finished unit. The inventory of materials at the end of each month should equal 25% of the following month's production needs. Purchases of raw materials for February would be budgeted to be: Multiple Choice 18,525 pounds 19,925 pounds 18,875 pounds 19,975 pounds A comprehensive budget may include any of the following components except a specialized budget? a tax budget. a cash flow statement. an operating budget. a capital budget. If the Social Security tax is 6% of a person's wages, what would the Social Security tax on wages of $80 be? What are the moral issues in this case? what ideals, obligations, and consequences must carla lombard consider? what rights, if any, are at stake? will it make a difference whether carla adopts a kantian approach or a utilitarian approach to this situation? According to the opening theme song of The Fresh Prince of Bel-Air, where did Will Smith spend most of his days? Because GE operates in many businesses, ranging from aircraft engines to healthcare imaging, GE would Find the passes through (5,4) has the x-axis as a horizontal asymptote, and the line x=4 Which statement based on the book review shows the MOST bias?A) Readers follow Simon through a maze of confusion. B) Vondermoot can always be counted on for a seamless story. C) Sashas father is in terrible danger and needs their help. D) Some favorite characters make appearances throughout the novel. If A=bh,what is A when b =8 and h=4? In the analysis of the optimal level of a public good, suppose that each person's utility function is quasilinear: Ui(G) + Pi. Show that the optimal G is unique and independent of P1 and P2 if society has adequate resources. (Hint: See Solved Problem 17.3.) what are the important factors shaping indian culture & leadership Every day after work Paul took his muddy boots off on the steps of thefront porch. Alice would have a fit if the boots made it so far as thewelcome mat. He then took off his dusty overalls and threw them intoa plastic garbage bag; Alice left a new garbage bag tied to the porchrailing for him every morning. On his way in the house, he dropped thegarbage bag off at the washing machine and went straight up the stairsto the shower as he was instructed. He would eat dinner with her afterhe was "presentable," as Alice had often said.What type of job does Paul do and how do you know this answer this and il mark ur answer as brainliest? Suzan is considering a piece of real estate that she can purchase for $916,000 today. The property will generate annual cash flows of $110,000 in perpetuity and the first cash flow occurs one year from today. What is Suzan's internal rate of return (IRR) from purchasing the property? Enter your answer as a decimal and round to four decimal places. For example, if your answer is 4.55%, enter .0455. Help please. Had health problems trying to catch up and learn my work. Thank you in advance!!! The punnet square is used to Sarah has the nonpurging type of bulimia. Sonia has the restricting type of anorexia. Which of the following is likely?A. Sarah uses fasting as a way to control her weight but Sonia does not.B. They are both aware that their eating patterns are not normal.C. Sarah is at risk for comorbid mental disorders but Sonia is not.D. They both are overly concerned with their weight. bekele dislikes sitting on the beach; he always gets nasty sunburn. choose the correct option that describes that sentencea. simple sentence b. compound sentencec. complex sentenced. compound-complex sentence I WILL MARK YOU BRAINELEST 1. What do you see in this picture?2. What do you think is going on?