Help Please answer in Python:
3.8 LAB: Read values into a list
Instructor note: This is the Unit \( 3.8 \) lab assignment for the zyBooks materials. Code hints: while user_input \( >0 \) : #This is the number that is greater than 0 from the list that is entered.

Answers

Answer 1

```python

numbers = []

user_input = int(input("Enter a number: "))

while user_input > 0:

   numbers.append(user_input)

   user_input = int(input("Enter a number: "))

```

The provided code allows the user to input a list of numbers greater than 0. It initializes an empty list called "numbers" and prompts the user to enter a number. It then enters a while loop that continues as long as the user input is greater than 0. Inside the loop, the user input is added to the "numbers" list using the append() . The program prompts the user again for the next number, and thefunction process continues until a number less than or equal to 0 is entered.

The code starts by initializing an empty list called "numbers" which will store the input values. The user is then prompted to enter a number using the input() function, and the entered value is converted to an integer using the int() function and stored in the variable "user_input".

The while loop is then used to repeatedly execute the code block as long as the condition "user_input > 0" is true. Inside the loop, the user's input value is appended to the "numbers" list using the append() function, which adds the value to the end of the list.

After appending the input value, the user is prompted again to enter the next number. This process continues until the user enters a number that is less than or equal to 0, at which point the loop terminates and the program moves on to the next line of code after the loop.

The resulting list "numbers" will contain all the input values that were greater than 0.

Learn more about python

brainly.com/question/30391554

#SPJ11

Answer 2

Answer:

0

Explanation:


Related Questions

WHO SAYS BUP ALL THE TIME ​

Answers

Answer:

Mario

Explanation:

FREE BRAINLIEST!!!
When recording a macro, the cursor will look like a _____ to indicate it is recording. A.microphone
B. Arrow
C. CD
D. cassette tape

Answers

Answer:

B

Explanation:

Answer:  

When recording a macro, the cursor will look like a cassette tape to indicate it is recording. This answer has been confirmed as correct and helpful.  

Explanation:

the correct answer is D

tony works for a company as a cybersecurity analyst. his company runs a website that allows public postings. recently, users have started complaining about the website having pop-up messages asking for their username and password. simultaneously, your security team has noticed a large increase in the number of compromised user accounts on the system. what type of attack is most likely the cause of both of these events?

Answers

cross-site scripting Both of these occurrences are most likely the result of a sort of attack.

Which security measure would keep unwanted users from accessing a company's cellular network?

Firewalls are incorporated into Windows and macOS, and they act as a barrier between your data and the outside world. Firewalls protect your company network from unauthorized entry and notify you of any intrusion attempts. Before you go online, make sure the filter is turned on.

Fuzzing, also known as fuzz testing, is an automatic software testing method that includes giving incorrect, unexpected, or random data as inputs to a computer programmed.

Learn more about Windows from here;

https://brainly.com/question/13502522

#SPJ4

What are the best programming languages of 2020 for beginners?

Answers

Probably skript! Up to you though

python

java

javascript

Kotlin

typescript

swift

are the best programming languages of 2020 for beginners.

hope this answer will help you

How do i fix this? ((My computer is on))

How do i fix this? ((My computer is on))

Answers

Answer:

the picture is not clear. there could be many reasons of why this is happening. has your computer had any physical damage recently?

Answer:your computer had a Damage by u get it 101 Battery

and if u want to fix it go to laptop shop and tells him to fix this laptop

Explanation:

an obstacle or barrier that may prevent you from accomplishing your goal is called

Answers

Answer:

a roadblock

Explanation:

A roadblock because it is

which of the following would be considered a career in communication? Select all that apply. A actor B author C editor D journalist​

Answers

Answer:

1. The answers are B and D

2. The answer is A

3. The answer is A

4. The answers are C and D

authoreditor journalist

Are the answers to this question.

A career in communication involves the use of professionals in mass media to to pass messages across to an audience.

Professionals in media work with different companies, organizations and businesses to do the jobs of  influencing and educating people or the intended audience about happenings, products and services and practices.

read more at https://brainly.com/question/13391998?referrer=searchResults

Which is government departments fund the Global Positioning System
The Global Positioning System is funded by the department of

Answers

Answer:

The department of defense

Explanation:

Data can't be protecting in MS word

Answers

Answer:

What exactly is your question?

Explanation:

Can a idler gear increase or decrease speed?

Answers

Answer:

The answer is increase

Explanation:

I remember this from last year... could you choose brainliest

How does the DNS solve the problem of translating domain names like example.com into IP addresses?

How does DNS help the Internet scale?

Answers

Answer:

DNS translates domain names and hostnames into IP addresses through a basic lookup function.  When a user requests a domain name (as in the case of a browser lookup) the computer queries the local DNS server to find the matching IP address.  If the local DNS server does not contain the information in it's local database, it contacts the next higher DNS system or the root domain DNS servers (i.e. microsoft.com - if the local system does not know it, it will query the well-known DNS server for the .com domain - which will know where to get the information).  

DNS helps the users by not requiring them to remember the IP address of every system them want to connect with.  microsoft.com is much easier to remember than 40.82.167.220.  

DNS also helps the internet scale through the use of load balancing.  Multiple systems can comprise a single web site with the web pages stored on many different machines with multiple IP addresses.  When a user requests the microsoft.com website IP, they are given the primary IP of the load balancer sitting in front of the multiple computers.  The load balancer will then distribute the traffic to any of the systems that are hosting the web page that are not busy.  To the end user it look like they are connecting to a single machine - when in fact they are connecting to one of potentially hundreds of web servers with the same content.  As traffic grows on the internet more servers are necessary to handle the additional traffic.  DNS helps ensure the end user will connect to the proper web server regardless of the number of web server copies spun up in response to the additional traffic.  This allows the capacity to scale as necessary without interruption to the web site.  

Explanation:

DNS translates domain names into IP addresses so that the browsers can be able to load internet.

Through a lookup function, DNS solve the problem of translating domain names like example.com into IP addresses. It should be noted that when a user requests a domain name, the local DNS server will then find the matching IP address.

If the information isn't contained in the local database, then the information will be requested from the next higher DNS system. Through the Domain Name System (DNS), the human readable domain are translated to machine readable IP addresses.

Lastly, Domain Name System also helps in scaling the internet through the use of load balancing. The load balancer helps in the distribution of the traffic to the system hosting the web page.

Read more on:

https://brainly.com/question/23944954

types of risks in entrepreneurship

Answers

strategic risk

financial risk

operational risk

compliance and regulatory risk

Business risk is a future possibility that may prevent you from achieving a business goal. The following are the common type of business risks.

Strategic Business Risk

Strategic risks result directly from operating within a specific industry at a specific time. To counteract strategic risks, you’ll need to put measures in place to constantly solicit feedback so changes will be detected early.

Legal Compliance Risk

Risks associated with compliance are those subject to the legislative or bureaucratic rules and regulations, or those associated with best practices for investment purposes.

Internal Operational Risks

Operational risks result from internal failures. That is, your business’s internal processes, people, or systems fail unexpectedly. Operational risks can also result from unforeseen external events such as transportation systems breaking down, or a supplier failing to deliver goods.

Reputational and Publicity Risks

Loss of a company’s reputation or community standing might result from product failures, lawsuits, or negative publicity. Reputations take time to build but can be lost in a day. In this era of social networking, a negative Twi tter posting by a customer can reduce earnings overnight.

The Quake, One of the first fully 3D games was released in the year? 1986 1996 1995​

Answers

It was released in 1996

What is a difference between Java and Python? (5 points)
a
Java requires brackets to define functions, while Python requires curly braces.
оо
Ob
Python ends lines of code with semicolons, while Java does not.
Python is a statically typed language, while Java is not.
Od
Variable types in Java cannot be changed, while Python allows them to change.

Answers

I'm not sure if this answers your question but I found this online:

The main difference between Java and Python is their conversion; the Java compiler converts the Java source code into an intermediate code called a bytecode while the Python interpreter converts the Python source code into the machine code line by line.

Sorry if this doesn't answer your question.

I'm not sure if this answers your question but I found this online:

The main difference between Java and Python is their conversion; the Java compiler converts the Java source code into an intermediate code called a bytecode while the Python interpreter converts the Python source code into the machine code line by line.

Sorry if this doesn't answer your question.

if you design a class with private data members, and do not provide mutators and accessors, then

Answers

If a class is designed with private data members and does not provide mutators and accessors, it limits the ability to modify or retrieve the values of those data members from outside the class.

When private data members are declared in a class, they are intended to be accessed and modified only within the class itself. By not providing mutators and accessors, the class restricts direct access to its data members from other parts of the program. This encapsulation promotes data hiding and encapsulates the internal implementation details of the class. However, it also limits the flexibility and usability of the class, as external code cannot directly interact with or modify the private data members. If external code needs to access or modify the private data members, it would require modifications to the class by adding mutators and accessors.

Learn more about mutators and accessors here:

https://brainly.com/question/29222161

#SPJ11

Significant design efforts, during deliberate planning at combatant commands, produce results as those commands _____. (Select all that apply.)

Answers

Answer:

All of above

Explanation:

im not sure pls tell me if im wrong

question 2 according to the mccandless method, what is the most effective way to first present a data visualization to an audience?

Answers

The McCandless method recommends giving an audience an overview of the information first, such as an elevated summary or a list of the main points, before providing a visualization tool.

How does visualization work?

The graphic depiction of data and information is the focus of the multidisciplinary topic of data and information visualization. When interacting with large amounts of data or information, like a time series, it is especially effective. In order to improve cognition, different aspects of abstract data are also being studied. Both non-numerical and numerical data, including such text and geospatial information, are included in the abstract data.

To know more about Visualization
https://brainly.com/question/29430258
#SPJ4

The method of encoding information to memory is called ___________. a. retention b. reviewal c. processing d. rehearsal please select the best answer from the choices provided a b c d

Answers

The method of encoding information to memory is called Rehearsal.

What is encoding?

Encoding is the process of transforming data into a specific format that can be used by other systems or applications. It is used to reduce the size of data, improve data security, and make it easier to store and transfer data. Encoding is used in various areas like communication, data storage, and data processing. It is used to transform information into a format that can be read and understood by both machines and humans. It is also used to encode passwords, images, videos, and audio files. Encoding is an essential process that helps make data more secure, efficient, and reliable.

To learn more about encoding
https://brainly.com/question/24613164
#SPJ4

Let T1, T2, T3, T4 be the following transactions: T1: R(X),W(X),R(Y),W(Y) T2: R(X),R(Z),W(X),W(Z) T3: W(Y) T4: W(Z) Consider the following schedule (where L means lock, U means unlock): Is S allowed with 2PL? No Yes

Answers

The given schedule is:

T1: R(X), L(X), W(X), R(Y), L(Y), W(Y), U(Y), U(X)

T2: R(X), R(Z), L(X), L(Z), W(X), W(Z), U(X), U(Z)

T3: L(Y), W(Y), U(Y)

T4: L(Z), W(Z), U(Z)

Assuming 2PL (two-phase locking) protocol, for a transaction to execute an operation on a data item, it must first acquire a lock on that item. Once the transaction releases a lock, it cannot obtain any more locks.

From the given schedule, we can see that the transactions acquire locks in increasing order of data items, but they do not release the locks in the same order as they acquired them.

For example, T1 acquires locks on X and Y, and then releases them in reverse order (Y first and then X). Similarly, T2 acquires locks on X and Z, and releases them in reverse order (Z first and then X).

This violates the strict 2PL protocol where all locks held by a transaction must be released only after the transaction has completed. Therefore, this schedule is not allowed with the 2PL protocol.

However, it is allowed with the relaxed 2PL protocol where locks can be released before the transaction completes, as long as the final unlock occurs after all operations are performed. In this case, transactions can release all the locks they hold before they finish executing.

Learn more about transaction releases a lock from

https://brainly.com/question/31868283

#SPJ11

According to the cloud computing trends for 2020 video case, what term is used to describe a distributed computing model where information is processed closer to its source?.

Answers

Answer:      Public cloud providers have begun to distribute their services to different geographical locations, becoming known as the distributed cloud. In this way, the cloud is broken up into multiple smaller datacenters in different locations rather than just one large datacenter.

Explanation:

What would you fix or improve in our current technology to make life better for all?

Answers

Answer in comments, it’s too long

What is a computer? What is computing? Define this in your own words and then check your understanding with a dictionary. Have you ever thought about how many computers are in your home? Have a look here and then brainstorm a list of items that could be considered a 'computer.' Next, group the items in the list. Think about how and why you are grouping the items. Select one type of computer group that you feel you could not live without and why. Share your list with groupings and the one group you would not live without and your rationale. PLEASE HELP

Answers

Answer:

A computer is a machine that accepts data as input, processes that data using programs, and outputs the processed data as information. Many computers can store and retrieve information using hard drives. Computers can be connected together to form networks, allowing connected computers to communicate with each other.

Computing is any activity that uses computers to manage, process, and communicate information

yes i have thought of it before.

central processing unit (CPU), monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers and motherboard.

we can not live without motherboard or any of these .It is like a human without bones even one part missing would be dangerous.

Explanation:

what is database management?​

Answers

Answer:

Database management is the process of organizing, storing, retrieving, and protecting data using a database management system (DBMS). The DBMS is a software application that enables users to interact with the database and manage data efficiently.

Database management involves designing the database schema, creating tables and fields, defining relationships between tables, and ensuring data integrity by enforcing constraints and validation rules. It also involves querying the database using SQL or other programming languages, updating or deleting data, and creating reports or visualizations of data.

2. How many binary bits make a hex digit?

Answers

A hex digit, or hexadecimal digit, represents a value in the hexadecimal number system. It is equivalent to four binary bits.

The hexadecimal number system is a base-16 system that uses 16 digits to represent values from 0 to 15. These digits are 0-9 for values 0-9 and A-F for values 10-15. Each hex digit corresponds to a unique combination of four binary bits.

To understand why four binary bits make a hex digit, we can examine the possible values in both systems. In binary, a single bit can represent two values (0 or 1). With four bits, we have 2^4 = 16 possible combinations, which aligns perfectly with the 16 digits in the hexadecimal system.

We can express this relationship using equations. Let's denote a binary digit as "b" and a hex digit as "h". Each hex digit can be represented by a combination of four binary bits as follows:

\(\[h = b_3 \cdot 2^3 + b_2 \cdot 2^2 + b_1 \cdot 2^1 + b_0 \cdot 2^0\]\)

Since each binary bit can take values 0 or 1, we can substitute these values into the equation:

\(\[h = (0 \text{ or } 1) \cdot 2^3 + (0 \text{ or } 1) \cdot 2^2 + (0 \text{ or } 1) \cdot 2^1 + (0 \text{ or } 1) \cdot 2^0\]\)

Thus, each binary bit contributes to one of the powers of two in the equation, allowing for 16 unique combinations and matching the range of values in a hex digit.

Learn more about binary here:

https://brainly.com/question/33333942

#SPJ11

Software that interprets command from the keyboard and mouse is also known as?

Answers

Answer:

I believe the answer is, Operating System.

Q2. What was General Motors trying to achieve by this job redesign?

Answers

General Motors was aiming to achieve improved efficiency and productivity through job redesign by streamlining processes and optimizing workflow.

Efficiency, as mentioned in the answer, refers to the ability to accomplish tasks with minimal wasted effort, time, or resources.

In the context of job redesign at General Motors, efficiency entails reorganizing work processes and optimizing them for maximum productivity. This may involve eliminating redundancies, automating certain tasks, or implementing lean principles.

By focusing on efficiency, General Motors aims to enhance its overall performance, reduce costs, and deliver products more effectively.

Efficient job design can lead to streamlined operations, improved output, and better resource allocation, ultimately contributing to the company's competitiveness and success in the automotive industry.

Learn more about Efficiency here:

https://brainly.com/question/33448017

#SPJ4

why are pirated software considered a threat?​

Answers

Pirated software are considered a threat because if they are able to infect your PC with a kind of adware, bots and even a ransomware, they can damage your PC.

What are the disadvantages of using pirated software?

The Disadvantages of Pirated software is known to be the likelihood to be infected with a kind of serious computer viruses, that tends to damage the a person's computer system.

Hence, Pirated software are considered a threat because if they are able to infect your PC with a kind of adware, bots and even a ransomware, they can damage your PC.

Learn more about pirated software from

https://brainly.com/question/3615098

#SPJ1

Which of the following organizations works to increase diversity in their field?


Screen Actors Guild

Directors Guild of America

Writers Guild

Dance/USA

Answers

Answer:

screen actors guild

Answer:

Dance/USA

Explanation:

Paavtc Unit 1: Performing Arts Test said it's this one

6. Python indexes lists beginning with the number 1.
True

False

Answers

Answer:

True

Explanation:

Python is like coding

URGENT! REALLY URGENT! I NEED HELP CREATING A JAVASCRIPT GRAPHICS CODE THAT FULFILLS ALL THESE REQUIREMENTS!

URGENT! REALLY URGENT! I NEED HELP CREATING A JAVASCRIPT GRAPHICS CODE THAT FULFILLS ALL THESE REQUIREMENTS!

Answers

In the program for the game, we have a garden scene represented by a green background and a black rectangular border. The cartoon character is a yellow circle with two black eyes, a smiling face, and arcs for the body. The character is drawn in the center of the screen.

How to explain the information

The game uses Pygame library to handle the graphics and game loop. The garden is drawn using the draw_garden function, and the cartoon character is drawn using the draw_cartoon_character function.

The game loop continuously updates the scene by redrawing the garden and the cartoon character. It also handles user input events and ensures a smooth frame rate. The game exits when the user closes the window.

This example includes appropriate use of variables, a function definition (draw_garden and draw_cartoon_character), and a loop (the main game loop). Additionally, it meets the requirement of using the entire width and height of the canvas, uses a background based on the screen size, and includes shapes (circles, rectangles, arcs) that are used appropriately in the context of the game.

Learn more about program on

https://brainly.com/question/23275071

#SPJ1

Other Questions
The scale of a map is 1 inch : 24 miles. What map distance represents 75 miles? Given that R is the midpoint /QS.QR= 6x and RS = 2x-1 find QS The rotation of earth takes approximately _______ to complete, and the revolution of earth takes approximately _______ to complete.A.1 day, 30 daysB.12 hours, 24 hoursC.365 days, 24 hoursD.24 hours, 365 days A tree grows 1/4 foot in 1/12 year. Write the rate at which this tree grows in 1 year as a fraction. Carry out the following calculation, paying special attention to the significant figures (where 4/3 is exact), rounding, and units. 3.39x10^7 g/(4/3)(3.1416)(1.65x10^2 cm)^3=____g/cm^3 What is the purpose of your media message? I NEED HELPPPP!!!! Define Untouchables and explain the relationship between them and the Brahmin in the caste system. 1 poin8) Patients with fluid retention often require frequent weightmonitoring. *TrueOFalse Sound can travel incredibly quickly: 1 mile in about 1/12 of a minute. Based on that, what is the approximate speed of sound?Simplify your answer and write it as a proper fraction, mixed number, or whole number._____miles per minute After owners of the Vaden of Beaufort Chevrolet began to complain about the increased cost of gas, a salesman decided to see if measures could be taken to decrease the extra cost. As a result, the car an example of a business-critical system would be an air-traffic control system. TRUE/FALSE What new communication techniques did you learn to use during the course?What were the most challenging techniques for you?Which tools do you feel will be the most useful for you in your career?How do you feel you will be able to use them both professionally and personally? What is the definition of movement in the 5 themes of geography? The table shows the relationship between b, the number of slices of bread, and c, the total number of calories in the bread. Calories in Bread Number of Slices, b Total Calories, c 2 140 280 6 420 8 560 Which equation represents the relationship between b and c? F C = 70b G c=b+70 H c = 1406 ] c=b+140 Which sentence contains a comma splice?I received a letter from my sister, I cant wait to read it!Although some people like to make hot chocolate with milk, I prefer to make it with water.When I got back from vacation, I had two hundred unread e-mails!I dont know how he does it, but my dad is always the first one to catch a fish. pic above please help On May 1XYX Inc. paid accounts payable of 38000 . Prior to the payment, XYX Inc. had current assets of 90000 and a current ratio of 3 . Calculate XYX Inc.'s current ratio after the payment of the accounts payable. Round your answer to two decimal places. Your Answer: PLease help me solve this can u help me i cant solve Which fact from Americas Place in the 21st Century World is MOST relevant in concluding that Americas enemy today is different? A. Terrorists lurk in unknown places. B. Americas success in Vietnam was mixed. C. President Monroe was president in the early 19th century. D. Many people do not want America to be the worlds police officer.