Write a program using integers user_num and x as input, and output user_num divided by x three times.Ex: If the input is:20002Then the output is:1000 500 250Note: In Python 3, integer division discards fractions. Ex: 6 // 4 is 1 (the 0.5 is discarded).LAB ACTIVITY2.29.1: LAB: Divide by x0 / 10main.pyLoad default template...12''' Type your code here. '''

Answers

Answer 1

Answer:

Following are the code to the given question:

user_num = int(input())#defining a variable user_num that takes input from user-end

x = int(input())#defining a variable x that takes input from user-end

for j in range(3):#defining for loop that divides the value three times

   user_num = user_num // x#dividing the value and store integer part

   print(user_num)#print value

Output:

2000

2

1000

500

250

Explanation:

In the above-given program code two-variable "user_num and x" is declared that inputs the value from the user-end and define a for loop that uses the "j" variable with the range method.

In the loop, it divides the "user_num" value with the "x" value and holds the integer part in the "user_num" variable, and prints its value.  


Related Questions


describe the evolution of computers.​

Answers

Answer:

First remove ur mask then am to give you the evolutions

How many ways are there to arrange the letters in the word ALGORITHMS? Note, the letter arrangement does not have to spell a word in the dictionary, but the new word must contain all the letters and each letter can be used only once.

Answers

there are ten letters in the word, so for the first position we can choose out of 10 option.

no matter wich specific option we choose, we will have 9 letters left for the 2nd letter.

and 8 for the third place.

...

when we will have used up 9 of 10 letters, there will be only one option for the last place.

the number of possible decision-paths is therefore given by this expression:

10*9*8*7*6*5*4*3*2*1

wich is 3,628,800

there are quite a few ways to rearrange 10 letters

The sorting method which commands entries in a going to head predicated on each character without regard to space as well as punctuation, therefore there are 3628800 ways.

The word 'ALGORITHMS' has 10 letters. There is no repeated letter so, the first Letter can hold 10 places if we start taking one letter at a time. The second can then hold nine positions, the third can hold eight, and so on.

So, as [tex]\bold{ 10\times 9 \times 8.... \times 3 \times 2 \times 1 = 362,8800}[/tex] ways, we have such a total number of ways.

Learn more:

brainly.com/question/17276660

Choose all that Apply: Which of the following steps should be performed by the CIS for creating a part dispatch for systemboard through Tech Direct?
a) Enter the customer's contact and email address into the primary contact fields when requesting a systemboard through TechDirect
b) Logging fusion ticket to request DPK via DDL
c) Access the customer's DDL account to retrieve DPK and activate the os for the customer
d) Verify the customer email address

Answers

Answer:

The steps that should be performed by the CIS for creating a part dispatch for system board through TechDirect are:

a) Enter the customer's contact and email address into the primary contact fields when requesting a system board through TechDirect

b) Logging fusion ticket to request DPK via DDL

c) Access the customer's DDL account to retrieve DPK and activate the os for the customer

d) Verify the customer email address

Explanation:

The four steps given above must be performed in the CIS if you want to create a part dispatch for the system board through TechDirect.  TechDirect is a support system that enables one to manage all Dell technologies from a single location. After creating the part dispatch, the customer's contact and email address are entered into the primary contact fields to enable the verification of the customer's email address  through the TechDirect.

Large computer programs, such as operating systems, achieve zero defects prior to release. Group of answer choices True False PreviousNext

Answers

Answer:

The answer is "False"

Explanation:

It is put to use Six Sigma had 3.4 defects per million opportunities (DPMO) from the start, allowing for a 1.5-sigma process shift. However, the definition of zero faults is a little hazy. Perhaps the area beyond 3.4 DPMO is referred to by the term "zero faults.", that's why Before being released, large computer programs, such as operating systems, must have no faults the wrong choice.

If an OS is using paging with offsets needing 12 bits, give the offset (in decimal or hexadecimal) to: the third word on a page _____ the last word on a page ______ (recall: 1 word is 4 bytes)

Answers

Answer:

Explanation:

If an OS is using paging with offsets needing 12 bits, give the offset (in decimal or hexadecimal) to: the third word on a page the last word on a page.

Declare an ArrayList of Strings. Add eight names to the collection. Output the Strings onto the console using the enhanced for loop. Sort the ArrayList using the method Collections.sort. Output the sorted List. Shuffle the list, and output the shuffled list. Note that Collections (with an s) is a class, while Collection is an interface. The Collections class has many useful static methods for processing interfaces, including the sort method. Search for a name in the list that exists; output the location where it was found. Search for a name that is not in the list. What location is reported? Convert the list to an array using toArray. Output the elements of the array. Convert the array back into a list using asList. Output the elements of the list.

Answers

Answer:

---------------------------

Explanation:

what is the meaning of compiler​

Answers

Answer:

in computing it means a program that converts instructions into a machine-code or lower-level form so that they can be read and executed by a computer.

Mối quan hệ giữa đối tượng và lớp
1. Lớp có trước, đối tượng có sau, đối tượng là thành phần của lớp
2. Lớp là tập hợp các đối tượng có cùng kiểu dữ liệu nhưng khác nhau về các phương thức
3. Đối tượng là thể hiện của lớp, một lớp có nhiều đối tượng cùng thành phần cấu trúc
4. Đối tượng đại diện cho lớp, mỗi lớp chỉ có một đối tượng

Answers

Answer:

please write in english i cannot understand

Explanation:

9.19 LAB: Sort an array Write a program that gets a list of integers from input, and outputs the integers in ascending order (lowest to highest). The first integer indicates how many numbers are in the list. Assume that the list will always contain less than 20 integers. Ex: If the input is:

Answers

Answer:

i hope you understand

mark me brainlist

Explanation:

Explanation:

#include <iostream>

#include <vector>

using namespace std;

void vector_sort(vector<int> &vec) {

int i, j, temp;

for (i = 0; i < vec.size(); ++i) {

for (j = 0; j < vec.size() - 1; ++j) {

if (vec[j] > vec[j + 1]) {

temp = vec[j];

vec[j] = vec[j + 1];

vec[j + 1] = temp;

}

}

}

}

int main() {

int size, n;

vector<int> v;

cin >> size;

for (int i = 0; i < size; ++i) {

cin >> n;

v.push_back(n);

}

vector_sort(v);

for (int i = 0; i < size; ++i) {

cout << v[i] << " ";

}

cout << endl;

return 0;

}

14. For the declaration, int a[4] = {1, 2, 3};, which one is right in the following description-
(
A. The meaning of &a[1] and a[1] are same B. The value of a[1] is 1-
C. The value of a[2] is 3
D. The size of a is 12 bytes

Answers

Answer:

A.

thanks later baby HAHAHAHAHAA

what is a mirror site?

Answers

Mirror sites or mirrors are replicas of other websites or any network node. The concept of mirroring applies to network services accessible through any protocol, such as HTTP or FTP. Such sites have different URLs than the original site, but host identical or near-identical content.
ANSWER: Mirror sites, often known as mirrors, are exact copies of other websites or network nodes.

1. Write the CSS for an id with the following characteristics: fixed position, light grey background color, bold font weight, and 10 pixels of padding

Answers

Answer:

#element

{

position: fixed;

background-color: RGBA(211, 211, 211, 1);

font-weight: bold;

padding: 10px;  

}

The manager of the Super Supermarket would like to be able to compute the unit price for products sold there. To do this, the program should input the name and price of an item per pound and its weight in pounds and ounces. Then it should determine and display the unit price (the price per ounce) of that item and the total cost of the amount purchased. You will need the following variables: ItemName Pounds Ounces PoundPrice TotalPrice UnitPriceYou will need the following formulas: UnitPrice = PoundPrice/16 TotalPrice = PoundPrice * (Pounds + Ounces/16)

Answers

Answer:

The program in Python is as follows:

name = input("Name of item: ")

PoundPrice = int(input("Pound Price: "))

Pounds = int(input("Weight (pounds): "))

Ounces = int(input("Weight (ounce): "))

UnitPrice = PoundPrice/16

TotalPrice = PoundPrice * (Pounds + Ounces/16)

print("Unit Price:",UnitPrice)

print("Total Price:",TotalPrice)

Explanation:

This gets the name of the item

name = input("Name of item: ")

This gets the pound price

PoundPrice = int(input("Pound Price: "))

This gets the weight in pounds

Pounds = int(input("Weight (pounds): "))

This gets the weight in ounces

Ounces = int(input("Weight (ounce): "))

This calculates the unit price

UnitPrice = PoundPrice/16

This calculates the total price

TotalPrice = PoundPrice * (Pounds + Ounces/16)

This prints the unit price

print("Unit Price:",UnitPrice)

This prints the total price

print("Total Price:",TotalPrice)

Would you prefer to use an integrated router, switch, and firewall configuration for a home network, or would you prefer to operate them as separate systems

Answers

Answer:

I would prefer to use an integrated router, switch, and firewall configuration for a home network instead of operating my home devices as separate systems.

Explanation:

Operating your home devices as separate systems does not offer the required good service in information sharing.  To share the internet connection among the home devices, thereby making it cheaper for family members to access the internet with one  Internet Service Provider (ISP)  account rather than multiple accounts, a home network is required. A home network will always require a network firewall to protect the internal/private LAN from outside attack and to prevent important data from leaking out to the outside world.

write a loop that reads positive integers from stands input and that terinated when it reads an interger that is not positive after the loop termpinates

Answers

Loop takes only positive numbers and terminates once it encounters a negative numbers.

Answer and Explanation:

Using javascript:

Var positiveInt= window.prompt("insert positive integer");

While(positiveInt>=0){

Alert("a positive integer");

Var positiveInt= window.prompt("insert positive integer");

}

Or we use the do...while loop

Var positiveInt= window.prompt("insert positive integer");

do{

Var positiveInt= window.prompt("insert positive integer");

}

While (positiveInt>=0);

The above program in javascript checks to see if the input number is negative or positive using the while loop condition and keeps executing with each input until it gets a negative input

what operation can be performed using the total feature ​

Answers

They can do different surgery on people. One is called cataract total and hip replacement surgery which is what can be expected

In the file BankAccount.java, build a class called BankAccount that manages checking and savings accounts. The class has three private member fields: a customer name (String), the customer's savings account balance (double), and the customer's checking account balance (double).
Implement the following Constructor and instance methods as listed below:
public BankAccount(String newName, double amt1, double amt2) - set the customer name to parameter newName, set the checking account balance to parameter amt1 and set the savings account balance to parameter amt2. (amt stands for amount)
public void setName(String newName) - set the customer name
public String getName() - return the customer name
public void setChecking(double amt) - set the checking account balance to parameter amt
public double getChecking() - return the checking account balance
public void setSavings(double amt) - set the savings account balance to parameter amt
public double getSavings() - return the savings account balance
public void depositChecking(double amt) - add parameter amt to the checking account balance (only if positive)
public void depositSavings(double amt) - add parameter amt to the savings account balance (only if positive)
public void withdrawChecking(double amt) - subtract parameter amt from the checking account balance (only if positive)
public void withdrawSavings(double amt) - subtract parameter amt from the savings account balance (only if positive)
public void transferToSavings(double amt) - subtract parameter amt from the checking account balance and add to the savings account balance (only if positive)

Answers

Answer:

Explanation:

The following code is written in Java and creates the BankAccount class with all of the requested methods, including the constructor, getter and setter methods, withdraw methods, and even the transferToSavings method. A preview can be seen in the attached image below.

class BankAccount {

   private String customerName;

   private double savingsBalance, checkingsBalance;

   public BankAccount(String newName, double amt1, double amt2) {

       this.customerName = newName;

       this.checkingsBalance = amt1;

       this.savingsBalance = amt2;

   }

   public String getCustomerName() {

       return customerName;

   }

   public void setCustomerName(String customerName) {

       this.customerName = customerName;

   }

   public double getSavingsBalance() {

       return savingsBalance;

   }

   public void setSavingsBalance(double savingsBalance) {

       this.savingsBalance = savingsBalance;

   }

   public double getCheckingsBalance() {

       return checkingsBalance;

   }

   public void setCheckingsBalance(double checkingsBalance) {

       this.checkingsBalance = checkingsBalance;

   }

   public void depositChecking(double amt) {

       if (amt > 0) {

           this.checkingsBalance += amt;

       }

   }

   public void depositSavings(double amt) {

       if (amt > 0) {

           this.savingsBalance += amt;

       }

   }

   public void withdrawChecking(double amt) {

       if (amt > 0) {

           this.checkingsBalance -= amt;

       }

   }

   public void withdrawSavings(double amt) {

       if (amt > 0) {

           this.savingsBalance -= amt;

       }

   }

   public void transferToSavings(double amt) {

       if (amt > 0 ) {

           this.checkingsBalance -= amt;

           this.savingsBalance += amt;

       }

   }

}

Answer:

public class BankAccount {

  private String customerName;

  private double savingsBalance;

  private double checkingsBalance;

  public BankAccount(String newName, double amt1, double amt2) {

     this.customerName = newName;

     this.checkingsBalance = amt1;

     this.savingsBalance = amt2;

  }

  public void setName(String newName) {

     this.customerName = customerName;

  }

 

     public String getName() {

     return customerName;

  }

  public void setChecking(double checkingsBalance) {

     this.checkingsBalance = checkingsBalance;

  }

 

  public double getChecking() {

     return checkingsBalance;

  }

  public void setSavings(double savingsBalance) {

     this.savingsBalance = savingsBalance;

  }

  public double getSavings() {

     return savingsBalance;

  }

  public void depositChecking(double amt) {

     if (amt > 0) {

        this.checkingsBalance += amt;

     }

  }

  public void depositSavings(double amt) {

      if (amt > 0) {

         this.savingsBalance += amt;

     }

  }

  public void withdrawChecking(double amt) {

     if (amt > 0) {

        this.checkingsBalance -= amt;

     }

  }

  public void withdrawSavings(double amt) {

      if (amt > 0) {

        this.savingsBalance -= amt;

     }

  }

  public void transferToSavings(double amt) {

     if (amt > 0 ) {

        this.checkingsBalance -= amt;

        this.savingsBalance += amt;

     }

  }

}

You are having a problem with your Windows computer that is isolated to a single graphics editing program that you use every day in your work. When you described the problem to the customer service support person for this product, she told you that the only fix for it is to edit a key under HKEY-LOCAL_MACHINE\SOFTWARE. She has assured you that this fix will work without causing any problems, but you are wary of doing this. Descript the steps and precautions taken.

Answers

Answer:

I'm not a big tech head but I know that creating a restore point is highly recommended for changing anything that you aren't 100% sure about to your computer.

A technician is configuring the static TCP/IP settings on a client computer.
Which of the following configurations are needed for internet communications?
a. DHCP server address
b. DNS server address
c. Default gateway address
d. WINS address
e. APIPA address
f. Alternate IP address
g. IP address including a subnet mask (IPv4) or subnet prefix length (IPv6)

Answers

Answer:

The answer is below

Explanation:

Considering the situation and the available options above, the following configurations are needed for internet communications:

B. DNS server address: this matches the domain name to the IP address of a website such that browsers can bring internet resources.

C. Default gateway address: this uses the internet protocol suites and serves as a router to other networks in the absence of other route specifications that could match the destination IP address of a packet.

G. IP address including a subnet mask (IPv4) or subnet prefix length (IPv6): this is used by the internet-connected device to receive messages.

Question 1(Multiple Choice Worth 5 points)
(01.01 MC)
Which broad category is known for protecting sensitive information in both digital and hard-copy forms?
O Cybersecurity
O Information protection
O Information assurance
Internet Crime Complaint Center

Answers

Answer:

Information assurance

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Information assurance is a broad category that is typically used by cybersecurity or network experts to protect sensitive user information such as passwords, keys, emails, etc., in both digital and hard-copy forms

what its the difference between Arduinos and Assembler?

Answers

Answer:

The Arduino boards can be programmed in assembly. All you need is an ICSP Cable (In Circuit Serial Programmer) and the AVR toolchain (free from ATMEL) to write to the board. You then get the advantage of on board debugging.

As you suggested, you can just slap an ATMEL chip on a breadboard and go to town.

Explanation: cause i said so

The values of existing data can be modified using the SQL ________ command, which can be used to change several column values at once.

Answers

Answer:

The values of existing data can be modified using the SQL ___Update_____ command, which can be used to change several column values at once.

Explanation:

However, if you are interested in modifying some columns, then you must specify the columns of interest by using Update (table name) Set column1, column2, etc., which assigns a new value for the columns that you want to update, with each column value separated by a comma.  The SQL (Structured Query Language) Update command is used to update data of an existing database table.

Create a variable in php to store your university information and parse using jQuery Ajax and print your name. The variable must contain information about name, roll no, department and CGPA.

Answers

AnswLab giya j ty dy dio:

Explanation:

How long does it take to send a 15 MiB file from Host A to Host B over a circuit-switched network, assuming: Total link transmission rate

Answers

Answer:

The answer is "102.2 milliseconds".

Explanation:

Given:

Size of file = 15 MiB

The transmission rate of the total link= 49.7 Gbps

User = 7

Time of setup = 84.5 ms

calculation:

[tex]1\ MiB = 2^{20} = 1048576\ bytes\\\\1\ MiB = 2^{20 \times 8}= 8388608\ bits\\\\15\ MiB= 8388608 \times 15 = 125829120\ bits\\\\[/tex]

So,

Total Number of bits [tex]= 125829120 \ bits[/tex]

Now

The transmission rate of the total link= 49.7 Gbps

[tex]1\ Gbps = 1000000000\ bps\\\\49.7 \ Gbps = 49.7 \times 1000000000 =49700000000\ bps\\\\FDM \ \ network[/tex]

[tex]\text{Calculating the transmission rate for 1 time slot:}[/tex]

[tex]=\frac{ 49700000000}{7} \ bits / second\\\\= 7100000000 \ bits / second\\\\ = \frac{49700000000}{(10^{3\times 7})} \ in\ milliseconds\\\\ =7100000 \ bits / millisecond[/tex]

Now,

[tex]\text{Total time taken to transmit 15 MiB of file} = \frac{\text{Total number of bits}}{\text{Transmission rate}}[/tex]

[tex]= \frac{125829120}{7100000}\\\\= 17.72\\\\[/tex]

[tex]\text{Total time = Setup time + Transmission Time}\\\\[/tex]  

                 [tex]= 84.5+ 17.72\\\\= 102.2 \ milliseconds[/tex]

Identify and differentiate between the two (2) types of selection structures

Answers

Answer:

there are two types of selection structure which are if end and if else first the differentiation between if and end if else is if you want your program to do something if a condition is true but do nothing if that condition is false then you should use an if end structure whereas if you want your program to do something if a condition is true and do something different if it is false then you should use an if else structure

A recursive method may call other methods, including calling itself. A recursive method has:
1. a base case -- a case that returns a value or exits from a method without performing a recursive call.
2. a recursive case -- calling the method again with a smaller case..
Study the recursive method given below.
For example, this call recursiveMethod (5); returns 15:
public static int recursiveMethod (int num) (
if (num == 0)
return 1;
else {
if (numX2!=0)
return num * recursiveMethod (num -1);
else
return recursiveMethod (num-1);
}
}
1 What is the base case?
2. What does the following statement check?
3. What does the method do?

Answers

Answer:

Hence the answer is given as follows,

Explanation:

Base Case:-  

If (num == 0) //This is the base case for the given recursive method  

return 1;  

If(num % 2!=0) checks whether num is odd.  

The above condition is true for all odd numbers and false for even numbers.  

if the remainder is not equal to zero when we divide the number with 2 then it is odd.  

The method:-  

The above recursive method calculates the product of odd numbers up to the given range(that is num)  

For num=5   => 15(5*3*1).  

For num=7   => 105(7*5*3*1).  

For num=10 => 945(9*7*5*3*1).

____________________ are designed according to a set of constraints that shape the service architecture to emulate the properties of the World Wide Web, resulting in service implementations that rely on the use of core Web technologies (described in the Web Technology section).

Answers

Answer: Web services

Explanation:

Web service refers to a piece of software which uses a XML messaging system that's standardized and makes itself available over the internet.

Web services provides standardized web protocols which are vital for communication and exchange of data messaging throughout the internet.

They are are designed according to a set of constraints which help in shaping the service architecture in order to emulate the properties of the World Wide Web.

Answer:

The correct approach is "REST Services".

Explanation:

It merely offers accessibility to commodities as well as authorization to REST customers but also alters capabilities or sources.

With this technique, all communications are generally assumed to be stateless. It, therefore, indicates that the REST resource actually may keep nothing between runs, which makes it useful for cloud computing.

State two ways of preventing virus attack on a computer.​

Answers

Answer:

updating the computer and having an anti virus on your computer

mention two strategies of collecting data​

Answers

Types of quantitative and qualitative data collection methods include surveys and questionnaires, focus groups, interviews, and observations and progress tracking.

1. Describe data and process modeling concepts and tools.

Answers

Answer:

data is the raw fact about its process

Explanation:

input = process= output

data is the raw fact which gonna keeps in files and folders. as we know that data is a information keep in our device that we use .

Answer:

Data and process modelling involves three main tools: data flow diagrams, a data dictionary, and process descriptions. Describe data and process tools. Diagrams showing how data is processed, transformed, and stored in an information system. It does not show program logic or processing steps.

Other Questions
Batter boards (if properly offset) will allow for the end user to continually re-string the layout to double check accuracy without having to continually set up an instrument True False Not sure how to answer this:A. Identify the side that is acidicB. Explain why it's acidic C. Identify the side that is basicD. Explain why this side is basic (b) Two fair dice are tossed, and the up face on each die is recorded. Find the probability ofobserving each of the following events:A: (A 4 does not appear on either die)B: The difference of the numbers is 2 or less)(The sum of the numbers is odd)P(A) =(07 Marks)(P(B)(07 Marks)G)(07 Marks)sesP(C) If your doing a research project about war would you determine whether sources of information such as web sites biographies movies, and documentanes- are actually reliable sources ? Who was William Jennings Bryan?a) the leader of the Farmers Allianceb) the founder of the granger movementc) the Populist presidential candidate in 1896d) the Republican presidential candidate in 1896 3. If there were multiple products comment on finding the mixture melting point of the products. Does your sample appear to be a mixture or pure Suppose the market price of corn is $5.50 per bushel. Which of the following is not one of the three conditions that will need to be satisfied for the corn market to be in equilibrium at this price? A. Both the buyers and sellers of corn could benefit by making small changes to their market behaviors. B. The cost to corn farmers of growing the corn must be less than $5.50 per bushel. C. The quantity of corn produced by corn farmers will equal the quantity purchased by buyers. D. The buyers of corn will only use it for activities that they feel are worth at least $5.50 per bushel. If the profits in your consulting business increase by 8% one year and decrease by 2% the following year, your profits are up by 6% over two years. How was the Ngorongoro Crater created? by a volcano by a meteor with dynamite by wind erosion You want to randomly arrange 4 discs in a CD rack. What is the probability that the rack ends up in alphabetical order Which simplified fraction is equal to 0.53? Need answers now plz Sebastian received a raise this year so his income climbed from $45,000 to $52,000. Last year Sebastian purchased 2 sunglasses. This year he has purchased 7 sunglasses. Assuming that all of the other things remain constant, what type of a good are sunglasses and what type of income elasticity of demand does Sebastian have what similarities do ponyboy and johnny share? i need two, from the outsiders if that wasnt obvious lol A rectangular floor of area 360 m2 is going to be tiled. Each tile is rectangular, and has an area of 240 cm2. An exact number of tiles can be put into the space. How many tiles will be... Solve quickly MAN speeds are faster than WAN speeds because of ________. technological limitations regulatory limitations The current population of Fun City is 21000 people. If the population of the city will double every 51 years then the population after 171 years would be Please help will give brainliest According to your text, people with even a few close relationships experience _____ than those who are lonely. more communication anxiety a greater degree of job success more stress a greater sense of well-being 1) Your pen-pal has just written to you saying that he would like to spend two weeks with you during the x mass period write a letter to him inviting him to come and telling him howyou propose to make his visit enjoyable what happens at the end of translation?