a company wants to transmit data over the telephone, but is concerned that its phones could be tapped. all of the data are transmitted as four-digit integers. the company has asked you to write a program that encrypts the data so that it can be transmitted more securely. your program should read a four-digit integer and encrypt it as follows: replace each digit by (the sum of that digit plus 7) modulus 10. then, swap the first digit with the third, swap the second digit with the fourth and print the encrypted integer. your main duty for this assignment is creating an encrypt class which includes encrypt.h and encrypt.cpp. after finishing the task you can use cisp400v10a2.cpp to test the encrypt class. the following is the encrypt class specification. 1. the encrypt class has an integer private data member 8 element array named digits. the first four elements (0 ~ 3) are to store the original 4 digits integer and the next four (4 ~ 7) are to store the encrypted data. 2. encrypt class has several public member functions a. an encrypt constructor takes an integer of any digits and stores the last four digits. it encrypts the last four digits, stores the encrypted information, displays a call to the constructor information, and shows the original information and encrypted information. if the inputted number is less than or equal to 0 the integer is set to 9436. b. a displayoriginaldata function does not accept and return any data. it displays the first four elements of the private data member. page 3 of 6 cisp400v10a2 3 c. a storedata function takes an integer and does not return anything. it stores the last four digits of the passed in integer to the first 4 elements of the private data member, encrypts the data and store them in the last 4 elements of the private data member. d. a displayencrypteddata function does not accept and return any data. it displays the last four elements of the private data member.

Answers

Answer 1

The Encrypt class is a class that is used to encrypt data that is transmitted over the telephone. The class has an integer private data member which is an 8-element array named digits.

What is encrypt data?

Encrypting data is a process of transforming plain text data into a form that is unreadable to anyone except the intended recipient. It is used to protect the confidentiality of data and to ensure that it is only available to those who are authorized to access it.

The first four elements (0-3) are used to store the original four-digit integer, and the next four (4-7) are used to store the encrypted data.

The Encrypt class has several public member functions. The first is an encrypt constructor which takes an integer of any digits and stores the last four digits. It then encrypts the last four digits, stores the encrypted information, displays a call to the constructor information, and shows the original information and encrypted information. If the inputted number is less than or equal to 0, the integer is set to 9436.

The next public member function is the displayOriginalData function which does not accept and return any data. It simply displays the first four elements of the private data member.

The third public member function is the storeData function which takes an integer and does not return anything. It stores the last four digits of the passed in integer to the first 4 elements of the private data member, encrypts the data and stores them in the last 4 elements of the.

To learn more about encrypt data

https://brainly.com/question/30011139

#SPJ4


Related Questions

explain a real-life loop you encounter in your daily life which would best be represented using a while loop using pseudocode, write the looping structure of your example explain a real-life loop you encounter in your daily life which would best be represented using a for loop using pseudocode, write the looping structure of your example

Answers

To iterate through the objects in a collection, use an item-based for loop. Applying some operations to an item is helpful.

An index-based for loop is used to repeatedly run certain logic. While loop is also helpful to repeatedly carry out a logic. To iterate through the objects in a collection, use an item-based for loop. Applying some operations to an item is helpful. An index-based for loop is used to repeatedly run certain logic. While loop is also helpful to repeatedly carry out a logic. The sample below in c#.net demonstrates this. system use; empty main () names=new names[20] in a string; counter int = 0; /for loop with an index, for (int i=0;i++;i++;i++) for loop that is item-based. string s in names; foreach console.writeline(s); } whilst loop. while(counter<20) { console.read(names[counter]; console.read(names[i]);counter++; } }counter++; } }

Learn more about Item-based for loop here:

https://brainly.com/question/13099364

#SPJ4

which of the following is not a source of threat intelligence? a. database vulnerability repositories (dvr) b. file and code repositories c. dark web d. vulnerability databases

Answers

The correct option is (d). vulnerability databases. External sources like open-source information exchange or interactions amongst threat information-sharing organisations might provide threat intelligence.

Threat intelligence activities: what are they?

Solutions for threat intelligence acquire unprocessed information about potential dangers and threat actors, whether they are new or already exist. After that, the data is examined and filtered to create management reports and threat intelligence feeds, which both contain data that automatic security control solution can use.

What are some instances of cyber threat intelligence?

Cyber threat intelligence, for instance, can link an IP address to a malicious attacker and provide details on the malware that attacker is known to transmit if a corporation has outgoing connections to that IP address.

Learn more about threat intelligence here:

https://brainly.com/question/25754146

#SPJ1

how do you create a numeric vector named ""scores""

Answers

To create a numeric vector named "scores", you can use the c() function in R. The c() function allows you to combine values into a vector.

You can specify the values you want to include in the vector within the parentheses of the c() function. For example:
scores <- c(90, 85, 92, 88, 95)
This will create a numeric vector named "scores" with the values 90, 85, 92, 88, and 95. You can also use the seq() function to create a numeric vector with a sequence of numbers. For example:
scores <- seq(90, 100, 2)
This will create a numeric vector named "scores" with the values 90, 92, 94, 96, 98, and 100.

Learn more about a numeric vector here:https://brainly.com/question/14584599

#SPJ11

what will the following code segment evaluate to? a ← 9 b ← 5 c ← 4 expression = a b * c display(expression)

Answers

The code segment will display the value 180.

The following given code segment will evaluate to the expression 9 * 5 * 4, which equals 180. This is because the variables "a", "b", and "c" are assigned the values 9, 5, and 4, respectively, and the expression is set to the product of these three variables. Therefore, the code segment will display the value 180.
Here is the code segment with the evaluated expression:
a ← 9
b ← 5
c ← 4
expression = a * b * c
display(expression)
The final result of this code segment is 180.

Leran more about code segment here:https://brainly.com/question/25781514

#SPJ11

How to fix the your device is missing important security and quality fixes?

Answers

If you encounter the notice "Your device is missing essential security and quality fixes" on your Windows device, it implies that Windows has determined that some updates.

or patches are missing from your system, which might be critical to its security or performance. Here are some methods you may take to resolve the problem: Keep an eye out for updates: Check the Windows Update settings for any available updates. Install all available updates, including optional ones. Run the Windows Update Troubleshooter: Windows has a troubleshooter that can assist in identifying and resolving difficulties with Windows updates. Search for "troubleshoot" in the Start menu, pick "Troubleshoot settings" and click on "Additional troubleshooters". Choose "Windows Update" to launch the troubleshooter.

learn more about  security  here:

https://brainly.com/question/28070333

#SPJ4

what is dilations and scale factors independent practice worksheet

Answers

A worksheet for students learning about dilations and scale factors in mathematics is probably called "Dilations and Scale Factors Independent Practice Worksheet."

What are scale factors and dilation?

The scale factor is defined as the proportion of the new image's size to that of the previous image. A fixed location in the plane serves as the center of dilatation. The scale factor and the center of dilation are used to determine the dilation transformation. The image stretches if the scaling factor is greater than 1.

The scale factor worksheet is what.

The scale factor worksheets aid in students' understanding of geometrical drawings as well as scale drawings and models. The young minds will learn how to compare two figures and comprehend their scale ratio by solving scale factor puzzles.

to know more about the dilations and scale factors here:

https://brainly.com/question/8765466

#SPJ4

The Percent Style button formats selected cells as a percentage with ________.A)one decimal placeB)two decimal placesC)three decimal placesD)zero decimal places

Answers

Answer:

(b) two decimal places

Explanation:

To print your worksheet on a piece of paper larger than 8 1/2×11 inches which EXCEL tab would you use : _________

Answers

Choose Page Setup from the Page Layout tab. Choose the Adapt to checkbox on the Page tab, then decide by what percentage you want the sheet to be smaller or larger.

If your worksheet contains numerous columns, you can utilise the Scale to Fit options to make it smaller so that it would print more comfortably.

Take these actions: On the ribbon, click the Page Layout tab.

Choose 1 page in the Width box and Automatic in the Height box in the Scale to Fit group. Now the columns will fill one page, but the rows may fill more than one page. It's important to comprehend a few concepts related to resizing a worksheet to suit a printed page.

Learn more  about Page Setup here:

https://brainly.com/question/29577990

#SPJ4

Please I need answers

Answers

Enter data is the answer

what keyboard shortcut clears content for selected cells?

Answers

The Keyboard shortcut  to clear content for selected cells is: Ctrl+Shift+Del.

What is Keyboard?
A keyboard is a device used to input data into a computer or other electronic device. It typically contains keys for each of the letters of the alphabet, numbers, punctuation marks, and other keys for special functions. The keys are arranged in a standard layout, making it easier for users to quickly and accurately type out words and phrases. Keyboards can also be used to control video games and other applications. With the advent of wireless technology, keyboards have become increasingly popular for use with laptops and tablets.

To know more about Keyboards
brainly.com/question/26632484
#SPJ4

Check My Work
Compared with the traditional licensing model in which users purchase and install software, SaaS _____.
a. provides more reliable access in areas with no Internet service
b. offers less expensive upgrades and new releases
c. can be accessed from fewer devices per license
d. requires more maintenance on the part of customers
offers less expensive upgrades and new releases [CH 4]

Answers

Allows users to access software through the internet on a subscription basis.

What is Software?
Software is a set of instructions, data or programs used to operate computers and execute specific tasks. It can be divided into two main categories: system software, which controls the operation of the computer, and application software, which is used for specific tasks such as word processing, web browsing and gaming. Software can be installed on a computer by downloading it from the internet, buying it from a store, or writing it yourself. It is usually stored on the computer’s hard drive or other storage device. Software can be updated regularly to ensure that it works correctly and efficiently.

To know more about Software
https://brainly.com/question/28224061
#SPJ4

You can edit the contents of a cell in the Formula bar. is this true or false​

Answers

True. The Formula bar is used to edit and view the contents of a cell in a spreadsheet.

What is Spreadsheet?
A spreadsheet is a computer application program used to store, organize and manipulate data. It is a type of software program designed to create, sort and analyze numerical data in tabular form. Spreadsheets are generally used for financial information, such as budgeting and accounting, but can also be used for data analysis and data visualization. Spreadsheets often contain formulas that allow the user to quickly calculate results from the data entered. Common features of a spreadsheet include the ability to add and delete columns and rows, copy and paste data, create graphs and charts, and perform calculations with formulas.

To know more about Spreadsheet
https://brainly.com/question/26919847
#SPJ4

When you can change the internal model without affecting the conceptual model, you have ________.
a. conceptual separation
b. physical independence
c. structural distinction
d. logical independence

Answers

The correct answer is d. logical independence.

Logical independence
refers to the ability to make changes to the internal model without affecting the conceptual model. This is an important concept in database design, as it allows for flexibility and adaptability in the design and implementation of a database.

In contrast, conceptual separation (a) refers to the separation of different conceptual models within a system, physical independence (b) refers to the ability to make changes to the physical structure of a database without affecting the logical structure, and structural distinction (c) refers to the separation of different structural elements within a system.

Therefore, the correct answer to the question "When you can change the internal model without affecting the conceptual model, you have ________" is d. logical independence.

Learn more about  logical independence, here; https://brainly.com/question/28582120

#SPJ11

Microsoft Windows uses what type of file system to store your documents? - Flat - Accessible - Hierarchical - Relational

Answers

Windows uses the NTFS (New Technology File System) as its default file system for storing and managing files, which supports a range of advanced features such as file encryption, disk quotas, and file compression.

What type of file system is used to store your documents in Microsoft Windows?

Microsoft Windows uses a hierarchical file system to store documents and other files.

The hierarchical file system is often referred to as the File Explorer or Windows Explorer, and it organizes files and folders into a tree-like structure.

In this structure, the root directory is at the top, and all other directories and files are arranged below it in a hierarchical manner.

The hierarchical file system allows users to organize their files and folders in a logical and intuitive way, making it easy to navigate and locate specific documents or files.

Windows uses the NTFS (New Technology File System) as its default file system for storing and managing files, which supports a range of advanced features such as file encryption, disk quotas, and file compression.

However, Windows also supports other file systems such as FAT32 and exFAT for compatibility with other devices and operating systems.

To know more about file system, visit: https://brainly.com/question/29969853

#SPJ4

are there dependencies between any of the security concepts that we covered? for example, is authentication required for authorization? why or why not? g

Answers

Yes, there are dependencies between some of the security concepts.

Authentication is often a prerequisite for authorization because a user must first be identified and authenticated before access to resources can be granted or denied. In other words, authorization decisions are often made based on the authenticated identity of the user. Similarly, confidentiality is often a prerequisite for integrity, as maintaining the confidentiality of data is necessary to prevent unauthorized modification or tampering with that data. Additionally, availability is often related to the other security concepts, as attacks on confidentiality, integrity, and/or availability can all impact the availability of resources. Understanding these dependencies and their relationships is important for designing and implementing effective security measures.

To know more about authentication visit:

https://brainly.com/question/30091109

#SPJ1

dr. pendelton reviews a status report from his research partner. feedback travels to sender. sender encodes message. message travels over channel. receiver decodes message. sender has an idea.

Answers

Feedback enables the communication's sender to confirm that their message has been received and comprehended. The medium through which a message is transmitted is called a channel.

Is the channel the medium used to transmit a message?

The method used to transmit a communication message is called the channel. The message needs to be delivered, thus the sender uses a channel known as a communication. A communication channel disruption prevents the recipient from correctly deciphering the message.

Is there a message being decoded?

Decoding is the process through which the receiver converts an encoded message into a usable form.

To know more about Decoding visit:-

https://brainly.com/question/14587021

#SPJ1

If you needed to create a tag that represent values that are currently stored in an sql database, which tag is ideal to use?

Answers

If you need to create a tag that represents values stored in an SQL database, the ideal tag to use would be the <data> tag.

he <data> tag is a generic tag that can be used to represent any type of data, including data retrieved from a database. The tag can be used to encapsulate the values returned by a database query in a structured format that can be easily processed and manipulated by other software components. By using the <data> tag, you can ensure that the data is well-formed and easily accessible to other components in your application. Additionally, the use of a generic tag like <data> makes your code more modular and easier to maintain in the long run. If you need to create a tag that represents values stored in an SQL database, the ideal tag to use would be the <data> tag.

Learn more about database :

https://brainly.com/question/30634903

#SPJ4

- write a c program that: a. declares a variable and a pointer and assigns a value to the variable. b. assigns the address of the variable to the pointer. c. prints the address of the pointer and the value stored. d. changes the value of the variable. e. prints the address and the value of the pointer.

Answers

A   c program that declares a variable and a pointer and assigns a value to the variable is mentioned below:

#include <stdio.h>

int main(void) {

  int var = 10; // a. declares a variable and assigns a value to the variable

  int *pointer = &var; // b. assigns the address of the variable to the pointer

  printf("Address of pointer: %p \n", pointer); // c. prints the address of the pointer

  printf("Value of pointer: %d \n", *pointer); // c. prints the value stored in the pointer

*pointer = 20; // d. changes the value of the variable

  printf("Address of pointer: %p \n", pointer); // e. prints the address and the value of the pointer

  printf("Value of pointer: %d \n", *pointer); // e. prints the address and             the value of the pointer

   return 0;

}

Explain the C program in detail.

Low-level access to system memory is provided by the general-purpose and procedural C programming language. To become an executable that can be run on a computer, a C program must be run through a C compiler.

An example of C programming is provided.

Because it can be used for low-level programming (such as driver and kernel programming), the C language is considered a system programming language. Most of the time, it's used to make OS, drivers, kernels, hardware devices, and other things. The Linux kernel, for instance, cannot be used for internet programming like Java,.Net, PHP, etc. because it is written in C.

Learn more about C program:

brainly.com/question/15683939

#SPJ4

What do you use to separate arguments in a function?

Answers

In order to separate the arguments in a functions we apply the commas function .

How does it work?

A function is a set of instructions that, when called upon, carry out a particular task or set of tasks. It is a kind of routine or procedure that, given a certain input, produces a certain result.

A function can produce multiple outputs from a variety of inputs. Additionally, it is a standalone block of code that can be reused multiple times without having to be written over.

Functions are an essential component of programming and can be utilized to resolve difficult issues. They make it simpler for us to debug a large issue by allowing us to break it down into smaller, more manageable pieces.

Learn more about functions:

brainly.com/question/20476366

#SPJ4

describe how you would modify graph-search so that a* using your variant of graph-search will return optimal solutions when used with an admissible but inconsistent heuristic. justify your answer. hint: you only need to modify the part in the red box. rubric: correct modification (4) correct justification (4) correct pseudocode (7)

Answers

We can apply the following strategy to improve graph-search so that A* utilising an inconsistent heuristic can still provide ideal solutions: Create a new, perhaps unacceptable heuristic function h2 that is consistent with the original heuristic function h.

A popular algorithm in artificial intelligence and computer science to navigate a graph, which is made up of nodes and edges, is called graph search. By analysing the network and identifying the nodes and edges that connect the two nodes, such as a start node and a goal node, the objective of graph search is to find a path between them. A* search, which combines the breadth-first and depth-first search strategies, and breadth-first search are three different tactics used by graph search algorithms to explore the graph. Many issues, such as planning, pathfinding, and recommendation systems, can be resolved using these techniques.

Learn more about graph-search here:

https://brainly.com/question/29290701

#SPJ4

what signal modifier ensures that voip packets arrive in their proper order?

Answers

A signal modifier that ensures that VoIP packets arrive in their proper order is called a "Sequence Number."

This is a unique number assigned to each VoIP packet to keep them in the correct order as they travel through the network. By using sequence numbers, any out-of-order packets can be easily identified and reordered before being delivered to the recipient. This is an important function, as it ensures that the voice data is delivered in the correct order, which is essential for maintaining the quality of the VoIP call.

To mitigate the effects of delay and jitter, VoIP systems also use techniques like jitter buffers, as I mentioned in my previous response. So, while sequence numbers are an important part of the VoIP protocol, they are usually used in combination with other techniques to ensure reliable and high-quality voice communications over the internet.

Learn more about Sequence Number here:https://brainly.com/question/28173254

#SPJ11

Which syslog level indicates an emergency that could severely impact the system and cause it to become unusable?

Answers

Level 0 emergencies have the potential to seriously damage the system and render it useless.

What does syslog do?

Network devices can connect with a logging server using a common message format by using the System Logging Protocol (Syslog).Its key target was to define network device monitoring. Devices can broadcast notification messages via a Syslog agent in a number of unique situations.

What do log levels of severity mean?

Emergency, Critical, Alert, Mistake, Warning, Debug, Instructional, and Notice are the different severity levels. There is a logging architecture for each programming language that enables the storage of data in various forms.

To know more about Syslog Level visit :

https://brainly.com/question/30670598

#SPJ4

by recording all transactions across business network among participants, what aspect of blockchain creates the system of record?

Answers

The distributed ledger technology (DLT) used in blockchain creates the system of record by allowing all participants to have a shared and consistent view of the data that is recorded on the blockchain.

What is Blockchain?
Blockchain is an innovative technology that enables secure digital transaction without the need of a third-party. It is a decentralized, distributed digital ledger that records transactions across many computers around the world. It is secure and immutable, meaning that the data stored on the Blockchain cannot be altered or deleted. It is also designed to be open, transparent and auditable, allowing anyone to track the transactions.

To know more about Blockchain
https://brainly.com/question/30142702
#SPJ4

Anyone know 3. 4. 7 Kid's Shapes Toy for tracy the turtle in codehs? I'll give you brainliest!!

Answers

def set_position():

penup()

setposition(-100,75)

pendown()

#make diamond

penup()

setposition(-100,75)

pendown()

begin_fill()

color("red")

circle(60,360,4)

end_fill()

#make circle

penup()

setposition(100,75)

pendown()

begin_fill()

color("blue")

circle(60)

end_fill()

#make pentagon

penup()

setposition(100,-75)

pendown()

begin_fill()

color("green")

circle(60,360,5)

end_fill()

#make half circle

penup()

setposition(-100,-75)

pendown()

begin_fill()

color("yellow")

circle(60,180)

end_fill()


I hope im correct

10. which of the following are valid private ip addresses? (select all valid choices) a) 172.32.1.1 b) 10.255.255.255 c) 168.192.0.255 d) 192.168.0.1

Answers

Option b. 10.255.255.255c

An IP Address (Internet Protocol Address)

is a set of numaricals connected to a computer network and using the internet protocol for communication.

And a  private network in internet networking, is a computer network which uses private IP Address.

These addresses can commonly be used in any local Area networks such as offices, or residential environments.

These private IP Address are not related to any specific organization,  and anyone can use them with te approval of local and regional internet registries.

Learn more about IP Address here

https://brainly.com/question/14306158

#SPJ4

In comparison with a flat file system, _____ in a database.

Answers

In comparison with a flat file system,data organization in a database.

What is the database?

A database is an organized collection of structured data, generally stored and accessed electronically from a computer system. It is the collection of schemas, tables, queries, reports, views, and other objects. Database systems are used to store and manage large amounts of data. They can provide quick and easy access to data for applications, as well as ensuring data integrity and accuracy. Databases are used for a variety of purposes, including data warehousing, e-commerce, online transaction processing, data mining, and more.

To learn more about database

https://brainly.com/question/24027204

#SPJ1

what is the minimum amount of available buffer space advertised at the received for the entire trace? does the lack of receiver buffer space ever throttle the sender? g

Answers

The minimum amount of available buffer space advertised at the receiver  Information  for the entire trace is zero. Yes, the lack of receiver buffer space can throttle the sender if the receiver does not have enough buffer space to handle the incoming traffic.

The minimum amount of available buffer space advertised at the receiver for the entire trace is zero. This means that at some point in the trace, the receiver buffer was completely filled, and no more data could be accepted. When the receiver buffer is full, the sender will be throttled and will need to reduce their transmission rate in order to allow the receiver to process the data in their buffer. This can cause a decrease in performance if the sender is sending data faster than the receiver can handle. In the case of buffer overflow, the sender will be forced to decrease the transmission rate until the receiver is able to keep up with the data stream. The lack of receiver buffer space can also cause packet loss if the sender is unable to reduce their transmission rate fast enough to prevent the buffer from overflowing.

Learn more about Information here:

brainly.com/question/12947584

#SPJ4

which statement about exception handling is false? group of answer choices none of the above statements in false. the catch block contains the code that handles an exception if one occurs. bounds checking is performed at execution time with vector member function at, and if a subscript is within the bounds of the array, the member function throws an out of bounds exception. call the exception object's what member function to get the error message that's stored in the exception object.

Answers

The statement that is false is "none of the above statements is false." This is because, in fact, the statement "none of the above statements is false" is a statement in itself, and it may or may not be true.

As for the other statements, they are all true. The catch block is used to handle exceptions that occur during the execution of a program. The vector member function at performs bounds checking at execution time and throws an out of bounds exception if the subscript is outside the bounds of the array. And finally, the what member function of the exception object can be called to retrieve the error message stored in the exception object. Exception handling is an important concept in programming because it allows developers to gracefully handle errors and exceptions that may occur during the execution of a program. The statement that is false is "none of the above statements is false." This is because, in fact, the statement "none of the above statements is false" is a statement in itself, and it may or may not be true.

Learn more about array :

https://brainly.com/question/19570024

#SPJ4

suppose a new standard, the iddd-643 standard, is developed for storing numbers in a string of 16 bits. the first bit is used for the sign of the number (0 if positive and 1 if negative). the next five bits store the exponent plus the bias, and the remaining 10 bits store the mantissa. the bias is 15 and no bits are reserved for any special purposes. what is the smallest exponent that can be stored?

Answers

Suppose a new standard, the iddd-643 standard, is developed for storing numbers in a string of 16 bits .The smallest exponent that can be stored is -15

Exponent: What is it?

The number of times a number must be multiplied by itself is the definition of the mathematical concept of the exponent. The character "" stands for it. For instance, if the number 5 has a 2 as its exponent, its representation is 5².

This indicates that 25 must be obtained by multiplying 5 twice by itself. Scientific notation also makes use of exponents to represent extremely large numbers. 4.5 x 10⁶ is, for instance, equivalent to 4,500,000. To make large numbers easier to understand and more concise, exponents are used. Additionally, they are used to represent powers and operations in algebra.

Learn more about exponents:

brainly.com/question/22283047

#SPJ4

How to create this in python using for loops?


For input, ask the user for the investment amount, interest rate, and duration min and max

Answers

To create this in python using for loops is  investment = float(input("Enter the investment amount: ")) , interest = float(input("Enter the interest rate: "))

min_dur = int(input("Enter the minimum duration: "))

max_dur = int(input("Enter the maximum duration: "))

# Calculate the future value of the investment using a for loop

future_value = 0

for x in range(min_dur, max_dur + 1):

  future_value += investment * (1 + interest) ** x

# Print the future value of the investment

print("The future value of the investment is:", future_value)

What is the Loop?

A loop is a structure in the programming language that lets code run again and again. It can be used to carry out a set of instructions until a particular condition is satisfied or a particular number of times are repeated. When dealing with repetitive tasks like printing a series of numbers or doing a calculation on a large set of data, loops are helpful.

What is a Python loop?

Looping is the process of repeating something until a particular condition is met. In Python, a for loop is a control flow statement that repeats the execution of a set of statements as long as the condition is met. An iterative statement is another name for this kind of statement.

Learn more about loop:

brainly.com/question/23419814

#SPJ4

Other Questions
which 3 kingdoms are in the bacteria domain barry wrote 6 different numbers, one on each side of 3 cards, and laid the cards on a table, as shown. the sums of the two numbers on each of the three cards are equal. the three numbers on the hidden sides are prime numbers. what is the average of the hidden prime numbers? Write a composition of at least 500 words, using the illustrative pattern. You may use example, definition, comparison or contrast, details, or any combination of these in your paper. You may use either the pendulum or the extended (block) method.You may use one of these suggested topics or one of your own:How dogs communicate with humansHow knowing English can help peopleHow advertisements affect peopleHow crime can be eliminatedIf your topic requires research support, remember to document your source(s) properlyPLEASE GIV EME A LEGIT AND ORIGINAL ESSAY :) the biggest part of the brain, called the ________, contains the cerebral cortex, which is ________ in humans that other animals. which type of lack of capacity is easiest to prove? intoxication mental incompetence contracting for necessities minor status assessment question samuel has mental competency issues. samuel entered into a contract with beth, but now samuel is petitioning the court to terminate the contract. what options does the court have in ruling in the case? choose 2 answer choices. the contract is void if samuel was incompetent at the time the contract was formed. the contract is void if samuel has been previously determined to be mentally incompetent. the contract is voidable if a court has previously determined samuel to be mentally incompetent. the contract is voidable if samuel was incompetent at the time the contract was formed. Find an equation of the line of symmetry of triangle ABC. (URGENT) ANSWER ALL THESE QUESTIONS ASAP PLEASE I NEED THIS LIKE RIGHT NOW1. In what type of pressure system does it rain the most often?2. What in your biome creates its climate? (factors)3. If your biome was elevated an extra 800 meters, how would climate change?4. If there were two suns equally distant from the Earth in the north and south. What would the climate look like?5. How will the weather change in the future due to climate change? Which medication should be administered to a patient who has a cholinergic crisis?1. Atropine2. Donepezil3. Echothiophate4. Pyridostigmine 4. Take into account the fact that Earth's populations are increasing. How could this factexplain the differences in the cancer death rate vs. the total number of cancer deaths. Drag figures and equations to the table to show the net and surface area of the rectangular prism. The numbers are W = 3cm.I = 6cm.H =3cm.Pleaseee helppp Which of the following items has volume? baseball diamond floor rug piece of paper water bottle south korea was considered an impoverished country in 1960. yet in 2017, it was the world's fifth largest economy. this demonstrates how international businesses must consider future potential as well as the Big Data MY PROGRESS-13% EO Decision Point: How to Calculate Share of Customer Big Data analysis can involve massive amounts of data and complex analysis. However, you know that some of the simpler customer relationship management (CRM) metrics are often a good starting point for firms seeking to increase their profitability. It is well-known that retaining an existing customer is far less expensive than acquiring a new one, so you suggest that the owners begin by calculating share of customer to identify opportunities to sell more products to existing customers. Before you can calculate Camp Plus's share of customer, you need to determine what type of data you need to gather. What data sources will you need to utilize to calculate share of customer? Select an option from the choices below and click Submit. e Internal and external data Internal data only External data only . How do societal attitudes of developed countries differ from those of undeveloped countries? This cattle trail ran from Bandera, Texas to Dodge City, Kansas in the late-1800s.a. Great Western Cattle Trailb. Chisholm Trailc. Sedalia Traild. Texas Trail An account that earned 23% annual interest compounded quarterly for 3 years and currently has a balance of $6258. Every month, the bakery orders blueberries to use in their blueberry muffins. They had a stock of 1.38 kilograms of blueberries. Last month, they used 1.12 kilograms. This month, they need a total of 1.26 kilograms of blueberries.How many kilograms of blueberries do they need to order?0.120.2611.26 Samantha is trying to run for City Council, but she needs to have500 total signatures on her petition in order to get on the ballot. She currently has 284 signatures and believes that her team of volunteers can get 28 signatures per day. Which of the following represents how many signatures Samantha expects to have in d days?284 + 28d500 - 28d500 + 28d284 - 28d portfolio d has a standard deviation of 17% and a correlation with the market of 1.00. if the standard deviation of the market is 15%, what is the beta for d? the tortoise and the hare are running a 1 km race. after running comfortably for 7 s, the hare is so far ahead that he decides to take a nap under a tree, 100 m away from the finish line. if the tortoise is moving constantly at a speed of 0.27 m/s, and the maximum speed of the hare is 15 m/s, how long can the hare afford to nap if he does not want to lose the race?(a) 6.67 s(b) 370 s(c) 3630 s(d) 3690 s