g Write a program that keeps asking the user for new values to be added to a list until the user enters 'exit' ('exit' should NOT be added to the list). These values entered by the user are added to a list we call 'initial_list'. Then write a function that takes this initial_list as input and returns another list with 3 copies of every value in the initial_list. Finally, inside main(), print out all of the values in the new list. For example: Input: Enter value to be added to list: a Enter value to be added to list: b Enter value to be added to list: c Enter value to be added to list: exit Output: a b c a b c a b c Note how 'exit' is NOT added to the list. Also, your program needs to be able to handle any variation of 'exit' such as 'Exit', 'EXIT' etc. and treat them all as 'exit'.

Answers

Answer 1

Answer:

Following are the code to the given question:

def list_function(initial_list):#defining a method list_function that takes list in parameter

   l = initial_list*3#defining l that multiple the list by 3

   return l#return list  

def main(): #defining main method    

   initial_list = []#defining an empty list

   while True:#defining while loop

       i = input("Enter value to be added to list: ")#defining i variable that input list value

       i = i.rstrip()#use rstrip method

       if i.lower() == "exit" and "EXIT" and "Exit":#defining if block that checks list value is in lower case  

           break#use break keyword

       initial_list.append(i)#use list that adds input value

       l = list_function(initial_list)#defining l variable that calls the list_function method

   for i in l:#defining for loop that print list items

       print(i)#print value

main()

Output:

Please find the attached file.

Explanation:

In this code, a method "list_function" is declared that takes list "initial_list" in parameter and defines "l" variable that multiple the list by 3 and return its list value.

In the main method an empty list "initial_list" is declared that defines a while loop that input list value and use rstrip method and define and if block that checks list value is in lower case and pass into the method and use for loop to prints its values.

G Write A Program That Keeps Asking The User For New Values To Be Added To A List Until The User Enters

Related Questions

The _____ of the Open Systems Interconnection (OSI) modelspecifies the electrical connections between computers and the transmission medium and is primarily concerned with transmitting binary data, or bits, over a communication network.

Answers

Answer:

"Physical layer" is the correct answer.

Explanation:

It dealt mostly with bit-level transfer across various equipment as well as it provides industrial automation connections to meet quality standards to something like digital downloads.The purpose of this layer would be to consolidate essential networking system compatibility so that information is being sent successfully.

Thus, the above is the correct answer.


What software tool can you use to see the applications that are currently running?

Answers

Answer:

You can use the task manager to see what programs are currently running.

Explanation:

Answer:

The answer is Task Manager.

Explanation:

The Microsoft Windows Task Manager is a general, quick, and easy method of viewing what programs, background processes, and apps are running on the computer.

Using the Task Manager, you can also view how much memory a program is using, stop a frozen program, and view available system resources.

what is function of java​

Answers

Explanation:

Java is an object-orinted programming language used for software develpment.

is defined as the condition in which all of the data in the database are consistent with the real-world events and conditions

Answers

[tex]\boxed{Data \:anomaly}[/tex] is defined as the condition in which all of the data in the database are consistent with the real-world events and conditions.

[tex]\red{\large\qquad \qquad \underline{ \pmb{{ \mathbb{ \maltese \: \: Mystique35}}}}}[/tex]

Which of the following statement is False? 1 point Context free language is the subset of context sensitive language Regular language is the subset of context sensitive language Recursively enumerable language is the super set of regular language Context sensitive language is a subset of context free language

Answers

Answer:

Context-sensitive language is a subset of context-free language

Explanation:

Considering the available options, the statement that is considered wrong is "Context-sensitive language is a subset of context-free language."

This is because generally every regular language can be produced through the means of context-free grammar, while context-free language can be produced through the means of context-sensitive grammar, and at the same time, context-sensitive grammars are produced through the means of Recursively innumerable.

Hence, the correct answer in this correct answer to the question is the last option *Context-sensitive language is a subset of context-free langage

Select the correct answer. Which input device uses optical technology?
A. barcode reader
B. digital pen
C. digital camera
D. joystick​

Answers

Answer:

barcode reader is the correct answer

sita didnt go to school. (affirmative)
me​

Answers

What is this supposed to be a question??

Countdown until matching digits Write a program that takes in an integer in the range 11-100 as input. The output is a countdown starting from the integer, and stopping when both output digits are identical. Ex: If the input is the output is 93 92 91 90 89 88 Ex: If the input is 11 the output is 11 Ex: If the input is 9 or any number not between 11 and 100 (inclusive), the output is: Input must be 11-100 For coding simplicity, follow each output number by a space, even the last one. Use a while loop. Compare the digits do not write a large if-else for all possible same-digit numbers (11,22,33...99), as that approach would be cumbersome for larger ranges. 29999.1122120 LAB ACTIVITY 4.13.1: LAB: Countdown until matching digits 7/10 main.c Load default template... 1 include 2 3 int main() 4 int n, i: 5 scanf("%d", &n); if (n < 20 Il n98) { 7 printf("%d",n); } else { i-n: 1e while (1) printf("%d", 1); if (icie - i/10) 13 14 15 16 17 } 18 printf("\n"); 19 return : 20 ) 12 break; Latest submission - 11:16 PM on 02/05/21 Total score: 7/10 Only show failing tests Download this submission 1: Compare output A 3/3 Input Your output 93 92 91 90 89 88 2: Compare Output A Input 11 Your output 11 3: Compare output a 3/3 Input 20 Your output 20 19 18 17 16 15 14 13 12 11 4: Compare output A 0/2 Output differs. See highlights below. Special character legend Input 101 Your output 101 Expected output Input must be 11-100 5. Compare output A 0/1 Output differs. See highlights below. Special character legend Input Your output Expected output Input must be 11-100

Answers

Answer:

The program in C is as follows:

#include <stdio.h>

int main(){

   int n;

   scanf("%d", &n);

   if(n<11 || n>100){

       printf("Input must be between 11 - 100");    }

   else{

       while(n%11 != 0){

           printf("%d ", n);

           n--;        }

       printf("%d ", n);    }

   return 0;

}

Explanation:

The existing template can not be used. So, I design the program from scratch.

This declares the number n, as integer

   int n;

This gets input for n

   scanf("%d", &n);

This checks if input is within range (11 - 100, inclusive)

   if(n<11 || n>100){

The following prompt is printed if the number is out of range

       printf("Input must be between 11 - 100");    }

   else{

If input is within range, the countdown is printed

       while(n%11 != 0){ ----This checks if the digits are identical using modulus 11

Print the digit

           printf("%d ", n);

Decrement by 1

           n--;        }

This prints the last expected output

       printf("%d ", n);    }

seven and two eighths minus five and one eighth equals?

Answers

Answer: 2.125

Explanation

Select the correct answer. Which is the bottom-most layer in the OSI model?
A application layer
B. physical layer
c. transport layer
D. presentation layer​

Answers

Answer:

B.Physical layer

Explanation:

I am sure.Hope it helps

The clone() method expects no arguments when called, and returns an exact copy of the type of bag on which it is called.

Answers

Answer:

true

Explanation:

This statement is true. This is a method found in the Java programming language and is basically used to create an exact copy of the object that it is being called on. For example, in the code provided below the first line is creating a new object from the Cars class and naming it car1. The second line is creating an exact copy of car1 and saving it as a new object called car2. Notice how the clone() method is being called on the object that we want to copy which in this case is car1.

       Cars car1 = new Cars();

       Cars car2 = (Cars) car1.clone();

The imperative programming paradigm is popular and is a part of object-oriented computing paradigm, because it: __________.
A. is based on computer organization and thus is efficient to execute on hardware.
B. matches the culture of doing things by following the step-wise instructions.
C. enforces the modularity and supports the development of large programs.
D. supports class inheritance and code reuse.

Answers

Answer:

B. Matches the culture of doing things by following the step-wise instructions.

Explanation:

Imperative programming paradigm follows a sequence of instructions and steps. The order of execution of the statement is necessary because their is sequence of statements. Operation is system oriented.

In imperative programming, the source code is a series of commands, this commands tell the computer what to do, when to do it and the order it will be done so as to achieve the best result. The code of imperative programming paradigm is quite easy to understand.

Conduct research to determine the best network design to ensure security of internal access while retaining public website availability.

Answers

Answer:

There are many benefits to be gained from network segmentation, of which security is one of the most important. Having a totally flat and open network is a major risk. Network segmentation improves security by limiting access to resources to specific groups of individuals within the organization and makes unauthorized access more difficult. In the event of a system compromise, an attacker or unauthorized individual would only have access to resources on the same subnet. If access to certain databases in the data center must be given to a third party, by segmenting the network you can easily limit the resources that can be accessed, it also provides greater security against internal threats.

Explanation:

The best method in network security to prevent intrusion are:

Understand and use OSI Model.  Know the types of Network Devices.  Know Network Defenses.  Separate your Network.

How can I improve security through network design?

In the above case, the things to do is that one needs to focus on these areas for a a good network design. They are:

Physical security.Use of good firewalls. Use the DMZ, etc.

Therefore, The best method in network security to prevent intrusion are:

Understand and use OSI Model.  Know the types of Network Devices.  Know Network Defenses.  Separate your Network.

Learn more about network security from

https://brainly.com/question/17090284

#SPJ6

Choose a topic related to a career that interests you and think about how you would research that topic on the Internet. Set a timer for fifteen minutes. Ready, set, go! At the end of fifteen minutes, review the sources you have recorded in your list and think about the information you have found. How w

Answers

Answer:

Following are the solution to the given question:

Explanation:

The subject I select is Social Inclusion Management because I am most interested in this as I would only enhance my wide adaptability and also people's ability to know and how I can manage and understand people.

Under 15 min to this location. The time I went online but for this issue, I began collecting data on the workability to tap, such as a connection to the monster, glass doors, etc.

For example. At example. I get to learn through indeed.com that the HR manager's Avg compensation is about $80,600 a year. I can gather from Linkedin data about market openings for HR at tech companies like Hcl, Genpact, etc. Lenskart has an HR director open vacancy.

This from I learns that for qualified practitioners I have at least 3 years experience in the management of human resources & that I need various talents like organizing, communications, technical skills, etc.

1. Imagine you are in a computer shop. Choose five things that would improve your digital lif​

Answers

Answer:

definitley a mac

Explanation:

im not much of an apple company person but i would love to try a mac im more of that disney person who likes the animated stuff like raya and the last dragon which came out in march and luca which came out last friday

Which of the following statements regarding the SAP Hana product implemented by Under Armour is NOT true?
A. All of the statements are true.
B. The program allows legacy silos to remain intact.
C. The program can run across platforms and devices.
D. The program provides real-time results.

Answers

Answer:A

Explanation:i need points

write the output of given program:​

Answers

Answer:

24

16

80

0

Explanation:

A+B=>20+4=24

A-B=>20-4=16

A*B=>A x B = 20 x 4 = 80

A MOD B=> Remainder of A/B = 0

Exercise#1: The following formula gives the distance between two points (x1, yı) and (x2, y2) in the Cartesian plane:
[tex] \sqrt{(x2 - x1) ^{2} + (y2 - y1) ^{2} } [/tex]
Given the center and a point on circle, you can use this formula to find the radius of the circle. Write a C++ program that prompts the the user to enter the center and point on the circle. The program should then output the circle's radius, diameters, circumference, and area. Your program must have at least the following methods: findDistance: This mehod takes as its parameters 4 numbers that represent two points in the plane and returns the distance between them. findRadius: This mehod takes as its parameters 4 numbers that represent the center and a point on the circle, calls the method findDistance to find the radius of the circle, and returns the circle's radius. circumference: This mehod takes as its parameter a number that represents the radius of the circle and returns the circle's circumference. area: This mehod takes as as its parameter a number that represents the radius of the circle and returns the circle's area. .​

Answers

Ddgdgdgdfdgdfdgdgdgdgdgdgdgdggdgdgdgdgg

_ is a term used for license like those issues by creative commons license as an alternative to copyright

Answers

, . , .

Explanation:

'

What is the value of x after the following code is executed?

x = 0
while x < 20 :
x = x + 1
else :
x = 10

Answers

I think it is X equals X +1 and while ex alt 20

In this module you learned about advanced modularization techniques. You learned about the advantages of modularization and how proper modularization techniques can increase code organization and reuse.
Create the PYTHON program allowing the user to enter a value for one edge of a cube(A box-shaped solid object that has six identical square faces).
Prompt the user for the value. The value should be passed to the 1st and 3rd functions as arguments only.
There should be a function created for each calculation
One function should calculate the surface area of one side of the cube. The value calculated is returned to the calling statement and printed.
One function should calculate the surface area of the whole cube(You will pass the value returned from the previous function to this function) and the calculated value results printed.
One function should calculate the volume of the cube and print the results.
Make a working version of this program in PYTHON.

Answers

Answer:

Following are the code to the given question:

def getSAOneSide(edge):#defining a method that getSAOneSide that takes edge patameter

   return edge * edge#use return to calculate the edge value

def getSA(SA_one_side):#defining a method that getSA that takes SA_one_side patameter

   return 6 * SA_one_side#use return to calculate the SA_one_side value

def volume(edge):#defining a method that volume that takes edge patameter

   return edge * edge * edge#use return to calculate edge value

edge = int(input("Enter the length of edge of the cube:\n"))#defining edge variable that input value

SA_one_side = getSAOneSide(edge)#defining SA_one_side that holds getSAOneSide method value

print("Surface area of one side of the cube:", SA_one_side)

surfaceArea = getSA(SA_one_side)#defining a surfaceArea that holds getSA method value

print("Surface area of the cube:", surfaceArea)#print surfaceArea value

vol = volume(edge)#defining vol variable that holds Volume method value

print("Volume of the cube:", vol)#print vol Value

Output:

Please find the attached file.

Explanation:

In the code three method "getSAOneSide, getSA, and volume" method is declared that takes a variable in its parameters and use a return keyword that calculates and return its value.

In the next step,edge variable is declared that holds value from the user and defines three variable that holds method value and print its value with the message.

help me with this please​

Answers

Different types of connections are..

-A network is two or more devices connected through links.

-There are two possible types of connections: point-to-point and multipoint.

-A point-to-point connection provides a dedicated link between two devices.

Explain the different types of topologies

-Star network…
In star topology each device in the network is connected to a central device called hub. Unlike Mesh topology, star topology doesn't allow direct communication.

-Ring network…
A number of repeaters are used for Ring topology with large number of nodes, because if someone wants to send some data to the last node in the ring topology

-Bus network…
In bus topology there is a main cable and all the devices are connected to this main cable through drop lines. There is a device called tap that connects the drop 

-tree topology…
Tree topologies have a root node, and all other nodes are connected which form a hierarchy. So it is also known as hierarchical topology. This topology integrates 

-Computer network…
Ring Topology; Star Topology; Mesh Topology; Tree Topology; Hybrid Topology; How to select a Network Topology? Types of Networking Topologies.

-Mesh networking…
Ring Topology; Star Topology; Mesh Topology; Tree Topology; Hybrid Topology; How to select a Network Topology? Types of Networking Topologies.

Different type of networks

-Computer network…
Virtual Private Network (VPN). By extending a private network across the Internet, a VPN lets its users send and receive data.

-LAN…
Using routers, LANs can connect to wide area networks (WANs, explained below) to rapidly and safely transfer data. 3. Wireless Local Area Network (WLAN).

-Wide area network…
Wide area network, or WAN. In terms of purpose, many networks can be considered general purpose, which means they are used for everything from sending files etc.

-Metropolitan area network…
MAN or Metropolitan area Network covers a larger area than that of a LAN and smaller area as compared to WAN. It connects two or more computers that are apart.

-Wireless LAN…
WLAN (Wireless Local Area Network) helps you to link single or multiple devices using wireless communication within a limited area like home, school, or office 

-Wireless network…
A Wireless Local Area Network or WLAN is a network that is used to connect different devices without using wires etc.

-Storage area network…
Storage Area Network is a type of network which allows consolidated, block-level data storage. It is mainly used to make storage last longer etc.

-Personal area network…
PAN can be used for establishing communication among these personal devices for connecting to a digital network and the internet.

-Campus area network…
A Metropolitan Area Network or MAN is consisting of a computer network across an entire city, college campus, or a small region. This type of network is large.

Explain your own understand about protocol and standards

A protocol defines a set of rules used by two or more parties to interact between themselves. A standard is a formalized protocol accepted by most of the parties that implement it.

explain layers in OSI model

Physical, Data Link, Network, Transport, Session, Presentation, and Application.

Explain layers in tcp/ip model

Four layers of TCP/IP model are 1) Application Layer 2) Transport Layer 3) Internet Layer 4) Network Interface. ... It is also known as a network layer. Transport layer builds on the network layer in order to provide data transport from a process on a source system machine to a process on a destination system.

what are the peer to peer processing

In peer-to-peer (P2P) networking, a group of computers are linked together with equal permissions and responsibilities for processing data. Unlike traditional client-server networking, no devices in a P2P network are designated solely to serve or to receive data

A company can either invest in employee training seminars or update its computer network. Since updating the computer network would result in more measurable benefits, the company would be best off updating its computer network. The argument above assumes that: Group of answer choices

Answers

Answer:

The more measurable a benefit, the greater value that benefit has to a company

Explanation:

Here, there are two choices ; organizing employee training seminars and computer network update. With an update in the company's computer network, accompanying benefits include ; Improved network performance, Extended feature accessibility, Enhanced firewall and security features, Enhanced efficiency leading to increased overall output. Employee training and seminar also comes with its own benefit which include enhanced employee knowledge. However , the measurable benefits of updating a computer network seems more numerous than employee training which could be a reason why the company chose to invest in its computer network as they feel that investments with more measurable benefits will impact more on the company.

Please write 2 paragraphs on where you envision yourself academically, and personally in 5 years, and in 10 years.
(What would you have accomplished by the year 2026, and 2031).

Answers

Answer:

Explanation:

This is a personal answer because everyone envisions something different.

In 5 years, I hope to have a well established Front-End Development freelancing site and various clients. Hopefully, this will drastically increase my income and allow for more options. I also would like to start investing heavily in different areas of interest. As for personal life, I would like to learn an instrument and work on developing relationships with those close to me.

In 10 years, I hope to have a large sum of money invested in various assets. I would also love to buy a piece of land and build a small home for myself. I see myself also having worked for a startup company developing an application that would drastically better the lives of a specific group of individuals. If all of this were to become a reality, I guess the only thing left that I would love to do would be to travel the world with someone special by my side.

Again, everyone's vision is different/unique and special to them. Hope this helped.

) Python command line menu-driven application that allows a user to display, sort and update, as needed a List of U.S states containing the state capital, overall state population, and state flower. The Internet provides multiple references with these lists. For example:

Answers

Answer:

Explanation:

The following is a Python program that creates a menu as requestes. The menu allows the user to choose to display list, sort list, update list, and/or exit. A starting list of three states has been added. The menu is on a while loop that keeps asking the user for an option until exit is chosen. A sample output is shown in the attached picture below.

states = {'NJ': ['Trenton', 8.882, 'Common blue violet'], 'Florida':['Tallahassee', 21.48, 'Orange blossom'], 'California': ['Sacramento', 39.51, 'California Poppy']}

while True:

   answer = input('Menu: \n1: display list\n2: Sort list\n3: update list\n4: Exit')

   print(type(answer))

   if answer == '1':

       for x in states:

           print(x, states[x])

   elif answer == '2':

       sortList = sorted(states)

       sorted_states = {}

       for state in sortList:

           sorted_states[state] = states[state]

       states.clear()

       states = sorted_states

       sorted_states = {}

   elif answer == '3':

       state = input('Enter State: ')

       capital = input('Enter Capital: ')

       population = input('Enter population: ')

       flower = input('Enter State Flower: ')

       states[state] = [capital, population, flower]

   else:

       break

Frames control what displays on the Stage, while keyframes help to set up

Answers

Answer: A keyframe is a location on a timeline which marks the beginning or end of a transition. So for example, you have a movie and it transitions to another scene, keyframes tell it when and where to start the transition then when and where to stop the transition.

Consider the code below. When you run this program, what is the output if the temperature is 77.3 degrees Fahrenheit?
temperature = gloat(input('what is the temperature'))
if temperature >70:
print('Wear short sleeves')
else:
print('bring a jacket')
print ('Go for a walk outside')

Answers

Answer:

The output would be "Wear short sleeves"

Explanation:

The temperature is 77.3 degrees and 77.3 > 70

In TCP, a welcoming socket is (a) used by the server to receive incoming request from a client (b) closed by the server when interaction with that client is completed (c) bound to a specific port number (d) all of the above

Answers

Answer: (d) all of the above

Explanation:

The Transmission Control Protocol refers to a transport protocol which is used to ensure the transmission of packets on top of IP.

In TCP, a welcoming socket is:

• used by the server to receive incoming request from a client

• closed by the server when interaction with that client is completed

• bound to a specific port number.

Therefore, the correct option is "All of the above".

The following SQL is which type of join? SELECT CUSTOMER_T. CUSTOMER_ID, ORDER_T. CUSTOMER_ID, NAME, ORDER_ID FROM CUSTOMER_T,ORDER_T WHERE CUSTOMER_T. CUSTOMER_ID = ORDER_T. CUSTOMER_ID

Answers

Answer:

Self Join

Explanation:

Required

The type of JOIN

Notice that the given query joins the customer table and the order table without using the keyword join.

SQL queries that join tables without using the keyword is referred to as self join.

Other types of join will indicate the "join type" in the query

each interior angle of a regular polygon is 150°.how many sides has the polygon​

Answers

Answer:

12 sides

Explanation:

{(n-2)x180}÷n

150=[tex]\frac{(n-2)*180}{n}[/tex]

150n=(n-2) x 180

150n= 180n-360

150n-180n=- 360

-30n= -360

n= 12

Sides of polygon is 12

Other Questions
por or para, fill in What is the primary role of county and municipal governments in Washington?to elect state legislatorsto enforce federal lawsto provide public servicesto create state laws The circumference of a circle is 125.6kilometers. What is the circle's radius? Leila works mowing lawns and babysitting. She earns $8.30 an hour for mowing and $7.30 an hour for babysitting. How much will she earn for 6 hours ofmowing and 4 hours of babysitting? an organic substance that promotes chemical change without being used up in the reaction itself An airline charges an extra fee if a carry-on bag weighs more than 30 pounds. After packing, Lorrie's carry-on weighs 21.2 pounds. The inequality represents the amount of weight Lorrie can add to the carry-on without going over the 30-pound limit. 21.2 + w less-than-or-equal-to 30 How much weight can Lorrie add to the carry-on without going over the 30-pound limit? Computer applications Guyzzz And Brainly hunter please help me! Add the correct suffix to the underlined item in each sentence write your answer on the blank. 1.A person who always acts on stage is an ________.2.A person who manages library is a ________.3.One that tells lies is a ________.4.A worthy student becomes a scholar and is granted full ________.5.A person who climbs mountains is a ________. Which correctly describes the height of acylinder?A) The distancebetween the twocircularbases.B) The distanceacross thecircularBase of thecylinder An athlete participated in a triathlon. Reaching the bicycle stage of the competition, the athlete, who was color blind, jumped onto a bicycle that was the same make and model as his own bicycle except that it was red rather than green, believing it to be his own. While riding the bicycle in the race, the athlete was involved in an accident that resulted in the total destruction of the bicycle. Is the athlete guilty of larceny The federal government gained the authority to force all five tribes of Southeast Indians to move west through __________. What is the goal of a discussion? Select all that apply.A.to explore ideas and points of viewB.to explore your own ideasC.to all agree with each otherD.to all disagree with each other Thinking like a paleontologist, what are your first observations about this fossil? What is the theme of your world poem and give an evidence ? Which exercise is most helpful both during a peer review and when editing your own text?reading the text out loudreviewing the text with others using a detailed rubricgiving helpful compliments which sentence is the clearest example of deductive reasoning?A. Planets are round. My basketball is round. Therefore, my basketball is a planet.B. Insects have six legs. Ladybugs are insects. Therefore, a ladybug has six legsC. Rodney is late everyday. Therefore Rodney will be late tomorrow.D. Max keep losing at tennis. Therefore, Max will win the next game of tennisBy the way the answer is 'b' from a pex Where did the homestead act encourage freed African to settle A : plantations in the south B: reservations in the Tennessee river valley C: big cities in the thorn D: farms on the Great Plains You are working on a graphical app, which includes multiple different shapes. The given code declares a base Shape class with an abstract area() method and a width attribute. You need to create two Shape subclasses, Square and Circle, which initialize the width attribute using their constructor, and define their area() methods. The area() for the Square class should output the area of the square (the square of the width), while for the Circle, it should output the area of the given circle (PI*width*width). The code in main creates two objects with the given user input and calls the area() methods.Sample Input:52Sample Output:2512.566370614359172The area of the square is 5*5=25, while the area of the circle is PI*2*2=12.566370614359172 find the missing angles Can u help me with this?