answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksana_A
1 month ago
7

print_pattern() prints 5 characters. Call print_pattern() twice to print 10 characters. Example output: ***** ***** in python

Computers and Technology
1 answer:
Amiraneli [921]1 month ago
5 0

Response:

def print_pattern():

print("*****",end=" ")

print_pattern()

print_pattern()

You might be interested in
Represent decimal number 8620 in (a) BCD, (b) excess-3 code, (c)2421 code, and (d) as a binary number
maria [879]

The decimal number 8620 can be expressed in the following ways:

a = 1000 0110 0010 0000

b = 1011 1001 0101 0011

c = 1110 1100 0010 0000

d = 10000110101100

I hope these representations answer your question and prove useful.

4 0
1 month ago
Write a loop that prints each country's population in country_pop. Sample output for the given program.
zubka84 [942]

Response:

Correct script pertaining to the previous query that showcases the output.

for x, y in country_pop.items(): #this for loop iterates through the list items.

   print(str(x) + " has " + str(y) + " people") #output function to display the values.

Result:

  • This code is written in Python and produces the output required by the previous question.

Clarification:

  • The code in the previous question is intended for Python language to show the output, however, it has inaccuracies.
  • A 'for' loop is necessary, which will allow the items to be displayed one at a time.
  • The list presented is structured as key-value pairs, thus the use of the 'items' function from Python dictionaries is essential to present the list items.
  • Additionally, two variables must be established in the for loop, one representing the key and the other representing the value.
7 0
26 days ago
Which selections are possible for controlling the start time of audio playback? Check all that apply. Automatic Rewind when done
maria [879]

Selecting the option to trim audio upon clicking would be your best answer

5 0
12 days ago
Write a function called simulate_several_key_strikes. It should take one argument: an integer specifying the number of key strik
oksian1 [797]

Answer:

The code for the solution is implemented using Python 3.

  1. import random
  2. import string
  3. def simulate_several_key_strikes(l):
  4.    char_set = string.ascii_lowercase
  5.    return ''.join(random.choice(char_set) for i in range(l))
  6. print (simulate_several_key_strikes(10))

Explanation:

This program is designed to create random characters, and the quantity of characters produced is determined by the user's input. Therefore, it is necessary to import the random library (Line 1). Additionally, we incorporate the string module to access its associated method for generating English letters (Line 2).

Then, we define the function simulate_several_key_strikes that accepts one parameter, l. Inside this function, the ascii_lowercase method is utilized to establish the character set of lowercase letters, which is stored in the variable char_set (Line 5). The random.choice method randomly selects a character from char_set, concatenating it with an empty string (Line 6). A for-loop is utilized to produce a total of l characters, generating the final output.

To test the function, we input 10 as an argument, producing a sample output such as:

xuiczuskoj

7 0
1 month ago
In the lab, you used the filter box in Wireshark to remove traffic from port 3389. What is that port used for? What filter synta
8_murik_8 [892]

Answer:

Port 3389 is designated for remote desktop access to graphical user interfaces.

The syntax for tracking ping traffic is " tcp.port eq 25 or icmp".

Explanation:

Wireshark serves as a network packet sniffer utilized for analyzing and troubleshooting packet transmission within a network.

The ping command is employed in networks to verify connectivity between two devices. It sends ICMP echo messages to an IP address and awaits their return if the connection exists. To filter ping traffic in Wireshark, the syntax " tcp.port eq 25 or icmp" is applied.

This port 3389 acts as a listening port for the Microsoft proprietary remote desktop protocol, allowing remote connections to graphical interfaces of systems running the RDP server.

6 0
1 month ago
Other questions:
  • Q) Select the two obstacles for data parsing
    5·2 answers
  • 3.14 LAB: Input and formatted output: Caffeine levels A half-life is the amount of time it takes for a substance or entity to fa
    9·1 answer
  • How many bits would be needed to count all of the students in class today? There are 5 children in the class.
    7·1 answer
  • An author is preparing to send their book to a publisher as an email attachment. The file on their computer is 1000 bytes. When
    6·1 answer
  • Assume that the following variables have been properly declared and initialized.
    12·1 answer
  • Sophie often makes grammatical errors in her document. Which feature of the Spelling and Grammar tool can she use to understand
    15·2 answers
  • What are the set of rules to move data from one computer to another?
    11·1 answer
  • A wireless network does not benefit like a wired network does, when it comes to collision reduction. Which device reduces collis
    6·1 answer
  • Define a new object in variable sculptor that has properties "name" storing "Michelangelo"; "artworks" storing "David", "Moses"
    12·1 answer
  • Suppose you have a certain amount of money in a savings account that earns compound monthly interest, and you want to calculate
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!