5.20 LAB: Output values below an amount Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integers that follow. Then, get the last value from the input, which indicates a threshold. Output all integers less than or equal to that last threshold value. Ex: If the input is: 5 50 60 140 200 75 100 the output is: 50,60,75,

Answers

Answer 1

Answer:

Following are the code to the given question:

x= input()#defining a variable x that inputs value from the user-end

l = x.split(" ")#defining variable l that splits the x variable value with a space

t= int(l[len(l)- 1])#defining a variable t that decrease the l length and convert the value into integer

for i in range(1, (len(l) - 1)):#use for loop to calculate the range of the list

      if int(l[i]) < t:#defining if block that checks the list value is lessthan t

          print(l[i])#print list values

Output:

Please find the attached file.

Explanation:

In the above-given code, an "x" variable is declared that inputs the value from the user-end, and use the "l" variable that splits all the value and defined a "t" variable that adds value into the list and convert the value into an integer.

In the next step, for loop is declared that counts the lists and use a conditional statement that checks list value is less than t and use the print the method that prints the list values.  

5.20 LAB: Output Values Below An Amount Write A Program That First Gets A List Of Integers From Input.

Related Questions

PLEASE PLEASE HELP pleeeeeeeeeaaaase

Answers

Answer:

Truuuuuuueee

Explanation:

Plz give brainliest

Answer:

It's true

Explanation:

I just had the same question , ur welcome :)

What does a computer program use as a means to evaluate a condition as True or False?

Answers

Answer:

true

Explanation:

Answer:

A Boolean expression.

Explanation:

A Boolean expression is a logical statement that is either TRUE or FALSE . Boolean expressions can compare data of any type as long as both parts of the expression have the same basic data type.

images that are made up of pixels and cannot be resized without losing quality?

Answers

Answer:

there are no known pictures that can be zoomed in and not lose quality. they will all be pixelized. mostly everything on a computer is made of pixels.

Explanation:

hope this helps!

~evita

Which command tells the for loop what to count by?
a. step
b. range
c. count
b. variable​

Answers

step is the answer. or option A

Answer:

A) Step

Explanation:

If a citation has a volume, title, and page numbers, it is a:

journal article citation

book citation

website citation

amphlet citation

Answers

Answer:

It has to be Journal Article Citation

Explanation:

Complete the sentence with the correct response.

The central core of an operating system is called the .

Answers

Answer:

Kernel

Explanation:

The Kernel is the program that constitutes the central core of the operating system kernel is the first part of operating system to load into memory during booting kernel is made of various modules which can not be loaded in running operating system kernel remains in the memory during the entire computer session

1) The Output of a computer can be seen on
b) Mouse
a) Monitor
c) Keyboard​

Answers

Answer:

Explanation:

Option B monitor is the correct answer

Answer:

ans is a

hello

myself swapna

Identify six specific skills that a computer software engineer is expected to demonstrate.

Answers

1.) Team work

2.) Disciple

3.). Creativity

4.) Attension To Deatil

5.) Time Mangament

Explanation:

Answer:

A computer programmer needs to demonstrate that they are:

1. A team player

2. Able to meet deadlines

3. Able to solve problems logically and efficiently

4. Able to create programs that fulfill their intended purpose

5. Able to be flexible (do many different types of jobs)

6. Able to adapt to new changes and be able to learn new skills

Explanation:

Computer programmers are tasked with creating software that works effectively with the given hardware and the people using it, and to do that, they have to be very skilled in many areas.

A DTP firm has published and printed fliers for an upcoming fundraising event. In which section of the flyer would you find the contact details of the DTP firm
A. Body
B. Credits
C. Navigation
D. Title

Answers

B.Credits at the end of the flyer

Multitasking systems _____.

are easier to develop than single programming systems
execute each job faster
execute more jobs at the same time
are used only in large mainframe computers

Answers

Answer: Multitasking systems execute more jobs at the same time, hence the name multitasking systems.

JAVA

Write a method that takes 2 parameters: an ArrayList list, and an int numRepeats representing the number of times to repeat each element in the array.


Return a new ArrayList with each element repeated numRepeats times.


For example, if we had an ArrayList list with the values ["hello", "world"]:


repeatElements(list, 3)

Should return a new ArrayList with the elements:


["hello", "hello", "hello", "world", "world", "world"]


public ArrayList repeatElements(ArrayList list, int numRepeats)

{


}

Answers

Answer:

Explanation:

The following Java code creates the repeatElements method as requested and uses the test case shown in the question to test the method. The output can be seen in the attached picture below.

import java.util.ArrayList;

class Brainly {

   public static void main(String[] args) {

       ArrayList list = new ArrayList();

       list.add("Hello");

       list.add("World");

       System.out.println(repeatElements(list, 3));

   }

   public static ArrayList repeatElements(ArrayList list, int numRepeats) {

       ArrayList newList = new ArrayList();

       for (Object x:list) {

           for (int i = 0; i < numRepeats; i++) {

               newList.add(x);

           }

       }  

       return newList;

   }

}

___________ helps businesses conduct interactive meetings online, including conferences, training, support sessions, and client presentations.

Answers

Answer: Web Conferencing

Explanation:  I was gonna say technology but that's super broad. It could also be collaborative tools but I think this is the correct answer.

in ICT what is the difference between Save and Save As

Answers

Choosing "Save" simply saves your work by updating the last saved version of the file to match the current version you see on your screen.

Choosing "Save As..." brings up a prompt to save your work as a file with a different name. For example, you might choose to save a document called "Paper - rev. 3" as "Paper - rev. 4". This way, you can save you file at different stages and keep multiple versions on your hard drive.

Choosing "Save" and then "Save As..." is also a good way to make a backup of your file. Just be sure to rename the file something new when you choose "Save As..." or you will overwrite the current saved version, just like choosing the "Save" command would do.

Answer:

Save updates the files that are already created.

Save as creates a new file or store the existing file in a new location.

Which of these are characteristics of a Python data type? Check all that apply.

A Python data type is weakly typed.

A Python data type can have numeric values.

A Python data type can be shown by keys and values within brackets [ ].

A Python data type must be stated before it can be used in a program.

A Python data type can be a string, a list, or a tuple with items that can be repeated using the asterisk ( * ).

A Python data type can be a dictionary that can be updated, changed, or removed.

A Python data type cannot have connecting sets of characters separated by commas.

Answers

Answer:

A Python data type is weakly typed.A Python data type can have numeric values.A Python data type can be shown by keys and values within brackets [ ].A Python data type can be a string, a list, or a tuple with items that can be repeated using the asterisk ( * ). A Python data type can be a dictionary that can be updated, changed, or removed.

1. What is a Network?

A.an arrangement of intersecting horizontal and vertical lines.

B.a group or system of interconnected people or things.

C.files on a computer

D.a device drive used to carry information




Answers

B. a group or system of interconnected people or things

Complete the sentence with the correct response.

When choosing a new computer to buy, you need to be aware of what operating it uses.

Answers

Answer:

When choosing a new computer to buy, you need to be aware of what operating system it uses.

Explanation:

An operating system is system software that manages computer hardware, software resources, and provides common services for computer programs.

What can be written to perform a certain number of iterations or to iterate until a specific result is achieved?

Answers

so in coding we use a thing called a loop to one of the most common loops is a if or loop this is when we tell the software to keep trying the task that is in the loop until it completes the task.

-scav

concept of green computing​

Answers

Answer:

Reducing Environmental Impact of Technology

Explanation:

The main concept of green computing is to reduce the environmental impact that technology has. This revolves around everything that has to do with technology and computing. Including using technology and software to create solutions to better the environment, while also using computing resources as efficiently as possible. Then when the physical devices are obsolete, recycle as much as possible in order to reduce the physical waste that technology has on the environment.

Select the correct text in the passage.
Which sentences highlight the correct way of preparing baked potato?
George finds that there are no vegetables at home today except potatoes. He decides to prepare something simple with the potatoes. He preheats oven to 350°F. He then cleans and scrubs the potatoes. He pierces potato skin with fork many times to create air routes. He finally bakes the potatoes in oven at 350°F for one hour. Joe is at home with his friend Elvis. He shows Elvis how to prepare baked potatoes. He preheats oven at 150°F. He then puts potatoes in water. After cleaning the potatoes, he bakes the potatoes in oven at 150°F for 30 minutes.

Answers

Answer:

. He preheats oven to 350°F. He then cleans and scrubs the potatoes. He pierces potato skin with fork many times to create air routes. He finally bakes the potatoes in oven at 350°F for one hour.

Explanation:this is correct because got it right on the test.

What is a network?
A. The software only that connects electronic devices so they can
communicate with each other

B. The hardware only that connects electronic devices so they can
communicate with each other

C. The hardware and software that prevents electronic devices from
communicating with each other

D. The hardware and software connecting electronic devices so they
can communicate with each other

Answers

Answer:  For a network to exist, both the hardware and software of a computer must be able to communicate with other computers, so the answer is D.

The hardware and software connecting electronic devices so they can communicate with each other.

What is Network?

An interconnected system of nodes that can send, receive, and exchange data, voice, and video traffic is known as a computer network, sometimes known as a data network. Servers or modems are two examples of nodes in a network. Endpoint users frequently use computer networks to exchange resources and communicate.

They frequently appear everywhere, including in buildings like homes, offices, and government agencies. Computer networks can be used to share information and get around geographical restrictions.

Several protocols and algorithms are used by network devices to define the precise transmission and reception of data by endpoints. For instance.

Therefore, The hardware and software connecting electronic devices so they can communicate with each other.

To learn more about Network, refer to the link:

https://brainly.com/question/15002514

#SPJ7

4. What is the difference between head tag and heading tag?​

Answers

Answer 515be559d883f8eab00011e5
head is the tag at the top of your page containing your meta-tags, styles, scripts and title. headings are the h1, h2, h3 etc tags that allow you to size your text. a is an anker usable in the url for navigating to other pages or as in-page navigation.

One of the benefits of holding an investment for over a year rather than selling it in less than a year is that the
A: capital gains on the investment will be taxed at a lower rate.
B: fees will not be charged by brokers for selling the investment.
C: money earned on the investment will be considered tax-free.
D: profits on the investment can be averaged over the length of time the investment
is held.

Answers

Answer:

A, Capital gains on the investment will be taxed at a lower rate.

Explanation:

omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!

A way to categorize information and point you to where to find that information is called
a. An index c. A table of contents
b. A glossary d. Both A and C

Please select the best answer from the choices provided
A
B
C
D

Answers

I think the answer is D

Answer:

D

Explanation:

The first step to keeping your home safe is to minimize the overall amount of _______________ materials you store in your home. (9 letters)

Answers

Answer: Hazardous

Explanation: Hazardous materials should be kept somewhere safe.

Answer:

i believe it would be dangerious

Explanation:

Kevin created a scene in an animation where he shows a leaf falling slowly. Which principle of animation did he follow in doing so? Kevin is using the principle of ____. This principle is proportional to the _____ of the objects displayed. Answers given for the first: Arcs, Timing, Staging Answers given for the second: Height, Length, Speed

Answers

Answer:

Kevin is using the principle of Timing. This principle is proportional to the Speed of the objects displayed.

Explanation:

Timing is one of the principles of animation wherein the speed of the movement of an object is controlled by the animator and made to harmonize with certain effects such as sounds. In an example of some projected balls we find that when getting to the peak, their movement is slower compared to when they are coming down.

Speed plays a key role here. This is similar to the slowly falling leaf. Speed and timing are major considerations. When paired with good sounds, the animation comes off better.

Restricciones en el uso, adquisición de licencias, No se puede modificar, No se puede redistribuir; son características del software

Answers

Answer:

Software de propietario o privativo.

Explanation:

Este tipo de software no permite ningún tipo modificación,ni redistribución, pues esa funciones están totalmente limitadas por el propietario o dueño del software.Si se requiere alguna distribución o copia ,el cliente debe solicitar pagar.

A security hole is a(n): Group of answer choices packet-level firewall small peep-hole in a door or wall to allow a security guard to examine an individual before allowing that individual access to a secure area or location malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users missing or absent protected mode addressing restrictions on user programs during multitasking or multithreaded program execution ANI system

Answers

Answer: malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users.

Explanation:

A security hole is the malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users.

A security hole is regarded as a software flaw that allows someone who isn't authorized to have access to the system. This vulnerability can be taken advantage of by a hacker or other threat factors.

Low-level programming languages are (5 points)
a
closer to human languages
Ob
less readable by humans
O
C
more readable by humans
Od
written in human languages

Answers

Answer:

Low-level programming languages are essentially written as the computer interprets them (examples would be assembly and machine language), so the answer is B.

Explanation:

Which tab automatically becomes available after inserting a text box? Drawing Tools Insert Text Box Tools Shape Tools

Answers

Answer:

insert text box

Explanation:

Explanation:

format tab

Explanation: when you draw a text box a new tab called the format tab appears. it contains tools to design and format and modify the text box.

Match each of the following terms to its definition: I. web-based II. open source III. project management IV. personal information manager V. proprietary A. software used to keep track of appointments B. software that is hosted on a website C. software used to track tasks and coordinate resources D. software which must be purchased E. software code that is freely available

Answers

Answer:

A. Personal information manager.

B. Web-based.

C. Project management.

D. Proprietary.

E. Open source.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.

Simply stated, it is a computer program or application that comprises of sets of code for performing specific tasks on the system.

Basically, softwares are categorized into the following categories;

A. Personal information manager: software used to keep track of appointments. It can be used to schedule and manage schedules easily.

B. Web-based: software that is hosted on a website. It works based on cloud computing services and as such requires the use of internet for use at all times.

C. Project management: software used to track tasks and coordinate resources.

D. Proprietary: software which must be purchased. It also known as a closed-source software and can be defined as any software application or program that has its source code copyrighted and as such cannot be used, modified or distributed without authorization from the software developer. Thus, it is typically published as a commercial software that may be sold, licensed or leased by the software developer (vendor) to the end users with terms and conditions.

Some examples of proprietary software are Microsoft Windows, macOS, Adobe photoshop etc.

E. Open source: software code that is freely available. It is typically published as a free software that may be downloaded on various platforms by the end users.

Following is the matched solution for the given question.

I. Web-based - B. software that is hosted on a websiteII. Open source - E. software code that is freely availableIII. Project management - C. software used to track tasks and coordinate resourcesIV. Personal information manager - A. software used to keep track of appointmentsV. Proprietary - D. software which must be purchased.

I. Web-based software refers to applications or programs that are accessed and used through a web browser. Instead of being installed on individual computers, the software is hosted on a server and accessed remotely over the internet.

II. Open source software refers to software whose source code is made available to the public. It can be freely used, modified, and distributed by anyone.

III. Project management software is designed to help teams and individuals manage projects efficiently. It assists in planning, organizing, and tracking tasks, resources, and timelines.

IV. Personal information manager (PIM) software is used to organize personal information such as appointments, contacts, notes, and tasks. It helps individuals manage their schedules, track important dates, and maintain personal productivity.

V. Proprietary software refers to software that is privately owned and controlled by a company or individual. It is typically distributed under licensing agreements, and users must purchase or obtain the necessary licenses to use the software.

Learn more about web-based software here:

brainly.com/question/4560046

#SPJ6

Other Questions
Which equation represents a line which is parallel to the line x+4y=-20x+4y=20? In 1-2 paragraphs, please explain the value of teamwork. WILL GIVE BRAINLIEST ANSWER Of segments CDF and CED, which of the segments has a greater area based on the given information? Justify with your work.(Do not use sin)Circle A has radius 10m and m angle CAD=90 degreesCircle B has radius 12m and m angle CBD=60degrees uhh i want a number three/baconator from wendys and fries please[tex]despasito[/tex] 240 t-shirts made in 9 hours. Round to the nearest tenth. How do I sort them because it doesnt quite make sense to me Which of the following is an example of good sports etiquette? Which statement accurately describes the scatterplot?:..A. There are two outliers.B. There are three distinct clusters.C. The points seem to be clustered around a line.D. There are no outliers. . Organisms with their genetic material in a nucleus include A. Plants B. Animals C. All of these D. Fungi can someone help me. its hard what was Leonardo da vinci's most important contribution to western art Which organization formed with the purpose of preventing african Americans from exercising and freedoms ? what is the scope of the study of ethics What two minerals are bones made of? 15 points! :)(my teacher keeps assigning stuff like this and I've heard it so much my memory has just poofed) Karla made a model of her grandfather's fishing boat using a scale where 2 inches represents 3 feet. Her grandfather's actual boat is 28 feet long. What is the length of Karla's model boat? A computer is priced at $1575, but is on sale for 15% off. What is the price of the computerafter the discount and 7.5% sales tax? Help its urgent, PLEASE HELP!!!!!!!!!!!!!!!! Solve for the missing value.58 What is the importance of Holy Communion in Christian faith (10 answers) 25 PNTS (WARNING, some reading required) -please be detailed if possible-Drag the tiles to the correct boxes to complete the pairs. Not all tiles will be used.Match each excerpt from Mark Twain's Adventures of Huckleberry Finn with the type of conflict it contains.TILES1: character versus self2: character versus society3: character versus nature4: character versus characterAREAS TO DRAG TILES TOA: Well, the days went along, and the river went down between its banks again; and about the first thing we done was to bait one of the big hooks with a skinned rabbit and set it and catch a catfish that was as big as a man, being six foot two inches long, and weighed over two hundred pounds. We couldn't handle him, of course; he would a flung us into Illinois.B: It made me shiver. And I about made up my mind to pray, and see if I couldnt try to quit being the kind of a boy I was and be better. So I kneeled down. But the words wouldnt come. Why wouldnt they? It warnt no use to try and hide it from Him. Nor from ME, neither. I knowed very well why they wouldnt come. It was because my heart warnt right; it was because I warnt square; it was because I was playing double. I was letting ON to give up sin, but away inside of me I was holding on to the biggest one of all.C: By and by he rolled out and jumped up on his feet looking wild, and he see me and went for me. He chased me round and round the place with a clasp-knife, calling me the Angel of Death, and saying he would kill me, and then I couldn't come for him no more.