Choose the correct numbers in order to have the following output.

3 1
3 2
4 1
4 2

for numx in [3,
]:
for numy in [1,
]:
print (numx, numy)

Answers

Answer 1

Answer:

4, 2

Explanation:

for numx in [3, 4]:

   for numy in [1, 2]:

       print (numx, numy)

make sure to indent properly

Answer 2

The correct numbers, in order to have the following output, are 4, 2. The correct option is d.

What are the outputs of coding?

A programmer may decide to incorporate outputs to keep the user updated on what is happening inside the program. Here, the user is presented with the program's data either visually (on the screen) or physically (as printouts or signals, for example).

The communication between an information processing system, such as a computer, and the outside world, which may include a human or another information processing system, is known as input and output, or I/O. The system's inputs are the signals or data it receives, and its outputs are the signals or data it sends.

for numx in [3, 4]:

  for numy in [1, 2]:

      print (numx, numy)

Therefore, the correct option is d. 4 2.

To learn more about the outputs of coding, refer to the link:

https://brainly.com/question/28992006

#SPJ2


Related Questions


What is the best approach when time is a constraint in a project?

Answers

Answer:

Time: The schedule for the project to reach completion Basically, the Triple Constraint states that the success of the project is impacted by its costs, time, and scope. As a project manager, you can keep control of the triple constraint by balancing these three constraints through trade-offs.

Explanation:

As the user moves out of the range of one access point, their wireless device must re-associate with a new access point as it comes within range. What is this process known as

Answers

This process is known as “Roaming”.

In the __________ phase of the SecSDLC, the team studies documents and looks at relevant legal issues that could affect the design of the security solution.

Answers

In the Analysis phase of the SecSDLC, the team studies documents and looks at relevant legal issues that could affect the design of the security solution.

What is this stage about?

This is known to be the phases of development where there is  Analysis or one can say requirements gathering and where one has clearly set out problem or project as well as others.

Note that In the Analysis phase of the SecSDLC, the team studies documents and looks at relevant legal issues that could affect the design of the security solution.

Learn more about Analysis phase from

https://brainly.com/question/13897351

#SPJ1

PLEASE HELP!
Before you answer:
-No spam (Will be reported)
-No incorrect answers (Will be reported)
-Correct answers and explanations will be mark as BRAINLIEST​​​​

Answers

Answer:

A. True or false

1.True

2.false

3.false

4.true

5.true

1) False. Java script is easy to learn and use.

2) True. The actions performed on the objects is called Methods.

3) True. There can be multiple scripts in a single documentation.

4) False. It's the complete opposite. Single Line comments starts with double dash (//)

5) True. Java Script uses interactive elements to make the HTML pages more interactive for the users.

Which managed service should you use if you want to do a lift and shift of an existing Hadoop cluster without having to rewrite your Spark code

Answers

The managed service should you use if you want to do a lift and shift of an existing Hadoop cluster without having to rewrite your Spark code is f G. Cloud's.

What is Lift and shift Hadoop clusters?

This is one where a person can migrate their existing Hadoop and Spark deployment so that they can use G. Cloud without  having to engage in re-architecting.

The managed service should you use if you want to do a lift and shift of an existing Hadoop cluster without having to rewrite your Spark code is f G. Cloud's as it is advantage fast and flexible way to put together infrastructure as a service and others.

Learn more about  managed service from

https://brainly.com/question/20495853

#SPJ1

which item is developed last in the cyclical process?

Answers

Answer:

Design Process

Explanation:

The multistep process by which designers and engineers design, build, and taste a new product is called the Design Process. There are multiple steps, including exploring, designing, planning, making, testing, and revising.

Answer:

Explanation:

Because of the issues that have been sketched above, a number of other methods of project management have emerged in recent years. These methods are particularly suited for IT-development projects. Examples of these relatively new streams within project management include DSDM, RUP, eXtreme Programming (XP), RAD and agile project management (McConnell, 1996; Kroll, 2004; Chromatic, 2003; Stapleton, 2002, [ii], [iii])

Although the above-mentioned methods of project management differ according to a number of aspects, they are essentially the same. Because the path toward the final goal of IT projects has proved so uncertain, these methods assume that the goal will be achieved in a number of short cycles. This is the background for the term cyclical project management for these methods

Which option is the hexadecimal code for 100% green?
O A. (0, 255, 0)
OB. #00FF00
OC. (255, 0, 255)
OD. #FFFF00

Answers

The option is the hexadecimal code for 100% green is #00FF00. Check more about the code below.

What is the hexadecimal code for 100% green?

The  green hex code is known to be #00FF00.

Note that the hexadecimal number system can also be called base-16 or simply as hex as it is a number system that employs the use of 16 unique symbols to depicts a specific value.

Learn more about hexadecimal code from

https://brainly.com/question/11293449

#SPJ1

In data communication, convergence refers to integrating voice, video, and data so that multimedia information can be used for decision making. True or False

Answers

In data communication, convergence refers to integrating voice, video, and data so that multimedia information can be used for decision making is true.

What is Convergence in Networking?

Convergence in networking is known to take place if one network provider gives networking services in terms of voice, data, and video in only one network offering.

Note that In data communication, convergence refers to integrating voice, video, and data so that multimedia information can be used for decision making is true.

Learn more about communication from

https://brainly.com/question/26152499

#SPJ4

You are running a Python script that is supposed to write data to an open file, but discover that the file contents are not updating even after the script finishes. What is most likely the issue

Answers

Based on the Python script the most likely the issue is that The file was not closed using the close() method.

What is the close() method?

The close() method is known  to be a kind of Reader Class that is seen in Java.

Note that it is one that is used to enclose  any stream and bring out the resources that are said to be busy in the stream.

Therefore, Based on the Python script the most likely the issue is that The file was not closed using the close() method.

Learn more about Python script from

https://brainly.com/question/26497128

#SPJ2

When will your stony brook email address become your default or preferred email address for official stony brook communications?.

Answers

The stony brook email address will become the default or preferred email address for official stony brook communications as from Aug. 14.

What is the email about?

This is known to be the primary campus email address.

Note that it is the address that the University sends official email notifications and it is said to become the 'preferred' or the default or preferred email address for official stony brook communications as from Aug. 14.

Learn  more about a email from

https://brainly.com/question/24688558

#SPJ1

What do you prevent when you use data validation in your database forms?
O code injection
O phishing
O botnet
O denial-of-service

Answers

Answer:

code injection

Explanation:

Validating the data in a database prevents someone from sneaking code to run without permission, aka code injection.

Phishing - this is disguising as a reputable company/person and trying to steal info (passwords, credit card numbers)

Botnet - this is a network of computers (most likely in the network because of a virus) that are used as a group for malicious purposes (like spam)

Denial-of-service - this is an attack which aims to deny users from accessing the content they want. a common example of this is flooding a server with spam requests, rendering it overloaded and unable to handle any user requests

what is the password based off of the clues

Answers

Answer:

i would say Plane, if not then Plane then the person's birthdate.

Explanation:

Which technique is best for determining the validity of an id?.

Answers

A technique which is best for determining the validity of an ID is comparing the signature on the ID to a fresh signature given by the ID holder.

What is validity?

Validity is a terminology which is used to determine that there are no errors in a given data set, and that the variables of a data set adheres to the specified standards.

In this scenario, a technique which is best for determining the validity of an ID is to compare the signature on the particular ID to a fresh signature given by the ID holder.

Read more on validity here: https://brainly.com/question/27138101

#SPJ1

By default, what appears on your screen whenever a new email arrives?.

Answers

By default, the appears on your screen whenever a new email arrives is a  Desktop Alert.

What is a Desktop Alert?

This is known to be a kind of  a notification that often shows on your desktop when a person is said to receive a new email message, a meeting request, or others.

Note that the Desktop Alerts need to be turned on by default and as such, By default, the appears on your screen whenever a new email arrives is a  Desktop Alert.

Learn more about Desktop from

https://brainly.com/question/7221406

#SPJ1

What is the digital revolution and how did it change society?

Answers

Answer:

The Digital Revolution (also known as the Third Industrial Revolution) is the shift from mechanical and analogue electronic technology to digital electronics which began in the later half of the 20th century, with the adoption and proliferation of digital computers and digital record-keeping, that continues to the present day.

The "digital revolution" is impacting everything, from economy, innovation, science and education, to health, sustainability, governance, and lifestyles. Digital technologies will fundamentally change business models, institutions and society as a whole, as new ecosystems emerge.

Explanation:

3. technologies such as _____, computers, networks, and the internet and world wide web enable us to communicate globally.

Answers

Technologies such as collaborative documents, computers, networks, the internet, and the world wide web enable us to communicate globally.

What is Technology?

Technology may be characterized as the application of scientific understanding to the reasonable purposes of human life and make it easy.

Collaborative documents assist the member of the wikis to assemble a lot of information in a very short period of time globally. It is easily accessed by all users to gain knowledge and information reserved by a community of people.

Therefore, technologies such as collaborative documents, computers, networks, the internet, and the world wide web enable us to communicate globally.

To learn more about Technologies, refer to the link;

https://brainly.com/question/25110079

#SPJ1

which task would a database administrator preform?

Answers

Sr I don’t know what about it today lol but it’s just a weird thing about to be with my buddy who knows what to say lol

Answer: Make sure protocols are in place and are being followed.

Explanation: Good luck! Hope this helps!

The Internet Protocol adds its own network layer header to the segment or datagram, and this network layer message is now called a

Answers

The Internet Protocol adds its own network layer header to the segment or datagram, and this network layer message is now called a TCP/IP protocol suite.

What is TCP/IP protocol suite?

The TCP/IP protocol suite is known as the Internet Protocol Suite (IPS), this is because it is said to receives from the layer above in form of data, and places its own header in front  of it.

Therefore, The Internet Protocol adds its own network layer header to the segment or datagram, and this network layer message is now called a TCP/IP protocol suite.

Learn more about Internet Protocol from

https://brainly.com/question/17820678

#SPJ4

Low-level formatting ____. Group of answer choices is different from physical formatting is usually performed by the purchaser of the disk device divides a disk into sections that the disk controller can read and write does not usually provide an error-correcting code

Answers

Low-Level formatting is usually performed by the purchaser of the disk.

What is low-level formatting?

Low-Level formatting can be defined as is performed at the factory which electronically creates the hard drive tracks and sectors and tests for bad spots on a disk surface.

Low-level formatting is usually performed by the purchaser of the disk device.

Therefore, B is the correct option.

Learn more about Low-level formatting here:

https://brainly.com/question/13797778

#SPJ1

Which type of computer is used microprocessor​

Answers

Assuming you mean which type of computer uses a microprocessor the answer would be: A pc and/or microcomputer which use a single chip which is a microprocessor for their CPU (central processing unit)

Work related information posted to social networking sites or discussed in public may create ___________ that can be exploited by the unauthorized recipient.

Answers

Answer:

Work related information posted to social networking sites or discussed in public may create Vulnerabilities that can be exploited by the unauthorized recipient .

Work-related information posted to social networking sites or discussed in public may create a vulnerability that can be exploited by the unauthorized recipient.

What are social networking sites?

Individuals have the chance to make acquaintances and develop relationships thanks to social networking. Families who live far apart from one another have used it as a vital tool to connect and stay in touch.

Users of professional networking sites can search for employment using their connections to identify ones that match their skills. One's profile can be viewed by other users and potential employers, who can also provide recommendations.

Therefore, Social networking site posts or public conversations involving work-related topics may expose a  vulnerability that an unauthorized recipient may use against you.

To learn more about social networking sites, refer to the link:

https://brainly.com/question/2083119

#SPJ2

_____________is a computing environment in which a service provider organization owns and manages the hardware, software, networking, and storage devices, with cloud user organizations (called tenants) accessing slices of shared resources via the Internet. Group of answer choices Cloud computing consumerization of IT Software Service Internet of Things

Answers

Answer:

Cloud Computing

Explanation:

Cloud computing is a term that refers to a platform and a sort of service. Servers are constantly provisioned, configured, reconfigured, and deprovisioned as needed by a cloud computing system. Physical or virtual computers can be used as cloud servers. Other computer resources, such as storage area networks (SANs), network equipment, firewalls, and other security equipment, are generally included in advanced clouds. Cloud computing also refers to apps that have been enhanced so that they may be accessed through the Internet. Large data centers and powerful servers are used to host Web applications and Web services in these cloud applications. A cloud application can be accessed by anybody with a good Internet connection and a basic browser.

Php code can be placed anywhere within the html markup

Answers

Php code can be placed anywhere within the html markup as A PHP script can be inserted into the document at any point. ". php" is the default file extension for PHP files.

How to use Php code?

As you can see, you can use any HTML you want in your PHP code without doing anything unique or extra, as long as it's outside of the PHP tags. To put it another way, if you want to incorporate PHP code into an HTML file, you can put it anywhere (as long as it's inside the PHP tags.

HTML tags and PHP scripting code are commonly found in PHP files.

Read more about the code :

https://brainly.com/question/25689052

#SPJ4

Match the Job description with the job titles.

Answers

1) Bricklayer 2) Roofer 3) Architectural drafter 4) landscape architect
number 1 to first box
number 2 to second box
number 3 to third box
number 4 to forth box

Who invented Napier's Bones and when? Write its functions. field of comm​

Answers

Explanation:

Napier's Bone was invented by Scottish mathematician John Napier in 1617 AD.... It's function is that it was very useful for finding multiplication at that time...

One of your team members works long hours and behaves very formally, especially when the manager is around. this
team member is likely to be from . select 2 options.
-the united states
-norway
-sweden
- china
-japan

Answers

Based on the given scenario, team member is likely to be from:

ChinaJapan

What is a formal behavior?

A Formal speech or behavior is known to be a  very serious one instead of one been relaxed or friendly.

Note that this is often used in official situations and Based on the given scenario, team member is likely to be from China and Japan because their way of life and relating to business conduct is always straight to the point, serious and no jokes.

Learn more about formal behavior from

https://brainly.com/question/8838403

#SPJ2

Write the code for a mapping that generates a list of the absolute values of the numbers in a list named numbers.

Answers

Answer (python):

mixednumbers = [49.5,  -2,  -54.5, -87.6,  17.3,  92,  -1.4,  47.7, -27.4, -31.8]

numbers = []

def absolute(num):

 num = abs(num)

 return num

mappednumbers = map(absolute, mixednumbers)

for i in mappednumbers:

 numbers.append(i)

print(numbers)

Explanation (in line numbers):

1 provides the numbers that we will work with in an array called mixednumbers

2 creates an empty array called numbers where we will store the result

4-6 create a function that will take a number, get the absolute value of it, then return it

8 is where we use our function and mixednumbers to create a map named mappednumbers (it contains the numbers in absolute value)

10-11 take each item in the map and append it to our numbers array (printing the map directly will give us a memory address)

12 prints the numbers array, giving us our solution

Output:

[49.5, 2, 54.5, 87.6, 17.3, 92, 1.4, 47.7, 27.4, 31.8]

A two-dimensional array arr is to be created with the following contents. Boolean[][] arr = {{false, true, false}, {false, false, true}};

Answers

The code segment that can be used to correctly create and initialize arr  is:

boolean arr[][] = new boolean[2][3];arr[0][1] = true;arr[1][2] = true;

What is two-dimensional array?

A two-dimensional array is known to be very similar to one-dimensional array.

It  is one that can be visualized as a grid or table that is made up of rows and columns.

Note that in the above statement, The code segment that can be used to correctly create and initialize arr  is:

boolean arr[][] = new boolean[2][3];arr[0][1] = true;arr[1][2] = true;  is correct.

See full question below

A two-dimensional array arr is to be created with the following contents. Boolean[][] arr = {{false, true, false}, {false, false, true}};

Which of the following code segments can be used to correctly create and initialize arr ?

boolean arr[][] = new boolean[2][3];

arr[0][1] = true;

arr[1][2] = true;

Learn more about  two-dimensional array  from

https://brainly.com/question/26104158

#SPJ1

The code section that may be used to successfully create and initialize arr is:boolean arr[][] = new boolean[2][3]; arr [0][1] = true . arr[ 1][2]=true;

What is a two-dimensional array?

A two-dimensional array is understood to be very much like a one-dimensional array. It is one that may be visualized as a grid or desk this is made of rows and columns.

Note that withinside the above statement, The code section that may be used to successfully create and initialize array is:

boolean arr[][] = new boolean[2][3];arr[O][1] = true Irr[1][2] = truue

Read more about the array :

https://brainly.com/question/24275089

#SPJ4

which is a key component to participating in a school-to-work program?

Answers

The key component to participating in a school-to-work program is known as Job shadows.

What are job shadows?

Job shadowing is known to be a kind of on-the-job training that gives room for an interested employee to follow closely an see or analyze another employee carrying out the work.

Therefore, one can say that the key component to participating in a school-to-work program is known as Job shadows.

Learn more about School from

https://brainly.com/question/2474525

#SPJ1

The __________ River is Europe’s longest river.

Answers

Answer:

The Volga river is Europes longest river.HOPE IT HELPS

Answer:

The volga river in the eastern part of europe

Other Questions
Which country was most influential in the development of industrialization?. Isolation is best described as What might be the benefits to naturalization? Your best friend has informed you that he will be visiting you on your birthday to give you a surprising gift.Write two diary entries.The first entry must indicate how you felt before your friend's visit and the second entry must indicate how felt after your friend's visit. there are 20 students 15 men and 5 women in a maths class,in how many different ways can a committee of 3 men and 2 women be choosen Question 9 of 10Two areas that have a high need for minority students and thus offer manygrant opportunities are nursing andA. businessB. law C. accountingD. education A box has candies in it: are taffy, are peppermint, and are caramel. (Each candy falls into only one of these categories.) Brian wants to select two candies to eat for dessert. The first candy will be selected at random, and then the second candy will be selected at random from the remaining candies. What is the probability that the first candy selected is taffy and the second candy is caramel?Do not round your intermediate computations. Round your final answer to three decimal places. The Ratio of two numbers is 3/5, and their sum is 104. What are the 2 numbers? Which part of the map is the subregion Asia? (1) Today, the amount of carbon dioxide released into the atmosphere is about twice the amount that remains in the atmosphere. . . . (2) The increased amount of carbon dioxide (and other gases) in the atmosphere is causing a rise in temperature called global warming. (3) These gases allow the sun's rays to pass through, but they absorb and radiate heat back to Earth, a phenomenon called the greenhouse effect. (4) Global warming is contributing to climate change, which is causing significant changes in many of the Earth's ecosystems.Source: Mader, Sylvia, and Michael Windelspecht. Essentials of Biology. 4th ed., WCB-McGraw, 2015.Which sentence from the passage uses a coordinating conjunction to join two independent clauses?Multiple choice question.sentence 1sentence 3sentence 4sentence 2 Write a letter to president lincoln and tell him your opinion on the anaconda plan. in your letter to president lincoln, explain general scott's strategy and express your overall opinion of the plan. then, rate the effectiveness of the plan [using a 1-3 rating scale: 1=not effective, 2=somewhat effective, 3=extremely effective]. Do you think we need the government to findsolutions to many disputes or conflicts? Why? what was the cause of the european interest in good from asia an athlete covers a distance of 0.4 km in completing one round . how many rounds does he make if he runs a total of 8.4 km distance ? As seen in the picture. Any help is appreciated :) An atom whose valence electrons conform to the octet rule is: pls help, thank you!! A bag contains 15 red candies, 15 yellow candies, and 15 blue candies. What is the probability of randomlychoosing two candies of the same color, without replacement? What is this poem about I never saw another butterfly 2. A function fis given by f: x 5x-8, where x R. Finda. f(-4)b. the value of x whose image is 12