answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
s344n2d4d5 [400]
2 years ago
10

Consider the following code: x = 17 y = 5 print (x % y) What is output?

Computers and Technology
1 answer:
Ierofanga [76]2 years ago
7 0

Answer:

The output to given python code is "2".

Explanation:

The description of the python program as follows:

  • In the given code, two variable is defined that is, x and y in which contain assign value that is 17 and 5.
  • In this code, variable x modules variable y that is (x%y). In python or any other programming language, modules (%) will give a remainder that is "2".
  • To print calculated value we use a print function, that prints its value.
You might be interested in
As a security engineer, compare and contrast the pros and cons of deploying hetero vs homogenous networks. Which costs more? Whi
Mama L [17]

Answer:

See below

Explanation:

In case of a homogeneous network, Skype is an example and OpenTable is an example of a heterogeneous network.

<u>Homogeneous</u> networks are easier to get started with since its all pre-integrated, and even the troubleshooting is more convenient if a problem arises. However, it then becomes a security concern if you choose to place all that power to a single vendor - known as ' monoculture'. One event can affect the entire network. On the other hand, a <u>heterogeneous</u> set up does not run this risk. Several different components are utilized which are not as vulnerable to security threats.

In conclusion, homogeneous networks cost more and heterogeneous networks are more secure.

8 0
2 years ago
Write a split check function that returns the amount that each diner must pay to cover the cost of the meal The function has 4 p
Trava [24]

Answer:

def split_check(bill, people, tax_percentage = 0.09, tip_percentage = 0.15):

   tip = bill * tip_percentage

   tax = bill * tax_percentage

   total = bill + tip + tax

   

   return total / people

bill = float(input())

people = int(input())

print("Cost per diner: " + str(split_check(bill, people)))

bill = float(input())

people = int(input())

new_tax_percentage = float(input())

new_tip_percentage = float(input())

print("Cost per diner: " + str(split_check(bill, people, new_tax_percentage, new_tip_percentage)))

Explanation:

Create a function called split_check that takes four parameters, bill, people, tax_percentage and tip_percentage (last two parameters are optional)

Inside the function, calculate the tip and tax using the percentages. Calculate the total by adding bill, tip and tax. Then, return the result of total divided by the number of people, corresponds to the cost per person.

For the first call of the function, get the bill and people from the user and use the default parameters for the tip_percentage and tax_percentage. Print the result.

For the second call of the function, get the bill, people, new_tip_percentage and new_tax_percentage from the user. Print the result.

7 0
2 years ago
Create a procedure named FindLargest that receives two parameters: a pointer to a signed doubleword array, and a count of the ar
Kay [80]

Answer:

See explaination

Explanation:

FindLargest PROC,

array_num: PTR DWORD,

arraySize: DWORD

mov esi, array_num

mov ecx, arraySize

mov eax, [esi]

dec ecx

scan_array:

add esi, 4

mov ebx, [esi]

cmp ebx, eax

JLE check_number

mov eax, ebx

check_number:

loop scan_array

ret

FindLargest ENDP

END

6 0
2 years ago
If you were investigating login issues on a Windows computer, which portion of the Event Viewer logs would be a good place to st
USPshnik [31]

Answer:

If we are investigating login issues then we have to start with 'security logs' in 'windows logs' portion of Event viewer.

Explanation:

Much information about login issues is contained in log files which are related to security because it is mostly security issue. Some it is also better to start with 'system logs' portion of windows logs portion of Event viewer when there may be system problems instead of security issues. But in most cases there is security issues so 'security logs' is better option overall

6 0
2 years ago
Access to sensitive or restricted information is controlled describes which of the key communications and information systems pr
Viktor [21]

Answer:

C: Security

Explanation:

Communications and information systems principles need to be, among other things, secure. They need to be able to protect sensitive information from those who intentionally not need to know. Some incident information like voice, networks, and data, are very sensitive and thus, should be secure to the right levels and should comply with privacy laws and data protection.

4 0
2 years ago
Other questions:
  • Which data type stores images and audio visual clips?
    15·1 answer
  • Which technology had the same effect in the 1920s as the internet did in the 2000s? the widespread effect of technology 1920s 20
    8·1 answer
  • The matrix theory is used in the ___ technique
    8·1 answer
  • Identify the normalized form of the mantissa in 111.01.
    14·1 answer
  • Define a function pyramid_volume with parameters base_length, base_width, and pyramid_height, that returns the volume of a pyram
    12·1 answer
  • You have configured your firewall to authenticate a group of 100 users who are in your company. You set up the database of users
    14·1 answer
  • Write a while loop that prints user_num divided by 2 until user_num is less than 1. The value of user_num changes inside of the
    5·1 answer
  • Discuss the importance of following a well-integrated change control process on IT projects. What consequences can result from n
    14·1 answer
  • 1. Used ____________ must be hot drained for 12 hours or crushed before disposal.
    15·1 answer
  • Describe the ways in which a computer-aided design (CAD) drawing makes the details of an image easier to understand.
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!