Answer:
2:
decNum = float(input("Decimal number: "))
if decNum != 16.5:
print("Does not equal")
elif decNum == 16.5:
print("Equal")
else:
pass
3:
if x > 57:
x += 4
print(x)
4:
numOne = int(input("Enter number: "))
numTwo = int(input("Enter number: "))
if numOne < 100 and numTwo < 100:
yes = numOne + numTwo
print(yes // 2)
else:
pass
Explanation:
Please give me brainliest.
Why would you add learning inside the app? A. To add contextual help for each page in the app B. To contact Salesforce support C. To link to your company’s onboarding resources D. To add resources about working in Salesforce Classic E. A and C
There are different reasons why there was the addition of learning to the app. The reasons why you would you add learning inside the app is that:
To add contextual help for each page in the app.To link to your company’s onboarding resources.Salesforce Learning Paths is known to result in bringing out the power of learning straight into the app.
It can help companies to update their teams as they function or work in Salesforce.
Through the use of the Learning Paths, firms whether big or small and other industry can update or equip their employees with timely, personalized learning in the flow of work.
This can therefore help employees of all experience levels by boasting their skills and in turn increase their productivity.
Learn more about Salesforce from
https://brainly.com/question/7452075
Why there should be laws against using phones and
driving?
Answer:
There should be laws against using phones & driving because you can get into an accident & you are not paying attention to the road & it's surroundings.
Explanation:
It is for your safety & other peoples safety around you.
What does
mean in computer science
Answer:
i think the answer is a character or characters that determine the action that is to be performed or considered.
Explanation:
hope this helps
I'm confused as to if subclasses can call the supers without any implementation and what the right answer is
Answer:
E
Explanation:
Since Example1 and Example2 inherit from Example0, all classes have the method doNothing() at their disposal, so you can call it from e0, e1 and e2.
However, the arguments of this method are Example1 and Example2, so you cannot pass Example0 as a first argument, and you cannot pass Example0 or 1 as a second argument. That only leaves answer E.
You can call the inheritance relation an "is a kind of" relation. So Example1 is a kind of Example0, and Example2 is a kind of Example1, but also Example2 is a kind of Example0.
Now you can understand why e2 can be passed as an argument for Example1, because e2 is a kind of Example1.
Can someone plss help me!!
Answer:
HTML elements are delineated by tags, written using angle brackets.
Explanation:
Tags such as <img /> and <input /> directly introduce content into the page.
What is the maximum possible value of num after the code has been run?
Answer:
the maximum value from the first line is 20 - 0 = 20
and from the second 20-5 and 20+5 so the maximum is 25
what hash format are modern windows login passwords stored in?
User passwords are hashed and stored in a registry hive as either an LM hash or an NTLM hash. This file requires System privileges to view.
What are the windows?Microsoft created Windows as an operating system. The operating system is responsible for allowing to use a computer. Windows comes preloaded on the majority of new personal computers (PCs), which contributes to its status as the world's most popular operating system.
A window is a distinct viewing area on a computer display screen that is part of a system that allows multiple viewing areas as part of a graphical user interface (GUI). As part of a windowing system, windows are managed by a windows' manager.
Therefore, user passwords are hashed and stored as either an LM hash or an NTLM hash in a registry hive.
Learn more about the windows, refer to:
https://brainly.com/question/13502522
#SPJ5
what is control structure write it's types .
Answer
Defination-:
A control statement is a statement and a statement whose execution its control.
Types-:
Selection StatementIteration StatementUnconditional branching StatementIT ethics are rules, policies, or principles that guide the behavior of IT professionals.
Question 7 options:
True
False
Answer: true
Explanation: true
In the program to evaluate passwords, you gradually built a message to display to the user. What did you add to the end of each message string to start each message on a new line?
message = message + "Your password needs an uppercase letter. _____ "
\endline
\e
\n
\newline
The option that one need to add to the end of each message string to start each message on a new line is \n.
What is a message string?This is known to be a kind of running aspect of text messages that relates to one topic or any question.
Based on the program written above, the option that one need to add to the end of each message string to start each message on a new line is \n as it is the one that will give the best result.
Learn more about program from
https://brainly.com/question/1538272
#SPJ2
[tex]{\huge{\underline{\bf{\pink{Question}}}}}[/tex]
: Given a matrix, we need to count all paths from top left to bottom right of MxN matrix. You can either move down or right.
Answer:
[1,2 ] is the matrix to count all paths from top left to bottom right of M×N matrix.Based on the information given, the correct option will be [1,2 ] is the matrix to count all paths from top left to bottom right of M×N matrix.
A matrix simply means a set of numbers that are laid out on rows and columns. The numbers in matrix can represent either data or mathematical equationsIt should also be noted that matrix can be used as way of providing quick approximation of calculations.In conclusion, the correct option is [1,2 ] is the matrix to count all paths from top left to bottom right of M×N matrix.
Learn more about matrix on:
https://brainly.com/question/1821869
Match each type of option on the left with a corresponding function on the right.
Answer:
yes. the above is correct
Explanation: q posted
Answer: Anwer is correctly shown!!!!!!!!
Explanation:
HOPE IT HELPS Y'ALL!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Q44. Cell A20 displays an orange background when its value is 5. Changing the value to 6 changes the background color to green. What type of formatting is applied to cell A20
The type of formatting that is applied to cell A20 is called conditional formatting.
Conditional formatting in Excel Sheet enables an easier method of highlighting noteworthy cells or ranges of cells, displaying data by employing data bars, color scales, and icon sets that match particular variations in data.
A conditional format modifies the look of cells based on the conditions you set. The cell range will be formatted provided that the conditions are true; if otherwise, it will be false and the cell range will not form.
Learn more about conditional formatting here:
https://brainly.com/question/25051360
given that play_list has been defined to be a list, write an expression that evaluates to a new list containing the elements at index 0 through index 4 in play_list. do not modify play_list.
Answer:
new_list = play_list[0:4]
Explanation:
new_list = play_list[0:4] is an expression that evaluates to a new list containing the elements at index 0 through index 4 in play_list.
What do you mean by an expression?A syntactic item in a programming language that may be evaluated to discover its value is known as an expression in computer science. Statement, a grammatical construct that has no meaning, is frequently contrasted with expression.
It is a grouping of one or more constants, variables, functions, and operators that the programming language interprets and calculates (in accordance with its own principles of precedence and association). For mathematical expressions, this procedure is known as evaluation.
In straightforward contexts, the outcome is typically one of several primitive kinds, such as a complex data type, a complex data string, a complex data Boolean type, or another type.
A function, and hence an expression that contains a function, may have side effects in many programming languages. Normally, a side effect-containing phrase lacks referential transparency. Expressions can be converted into expression statements in various languages by adding a semicolon (;) at the end.
Learn more about expression, here
https://brainly.com/question/16804733
#SPJ5
What are some of the restrictions to muscle wire?
Answer:
Muscle Wire is an extremely thin wire made from Nitinol (a nickel-titanium alloy) that is known for its ability to contract when an electric current is applied.Although thin and lightweight, one of the most amazing things about Muscle Wire is that they can lift many times their weight and are able to do 100 times more work per cycle than the human muscle. This material is easy to use, small in size, operates silently, has a high strength-to-weight ratio, and is easily activated using AC or DC power. This technology is ideal where mechanics require minimization, such as electronic textiles projects, robotics or nano-applications.Muscle Wire is an extremely thin wire made from Nitinol (a nickel-titanium alloy) that is known for its ability to contract when an electric current is applied.
HELP ME PLEASE
explain 2 threats to data that can arise when a pc is not connected to the Internet
Explanation:
Threats
Computer Security Threats are possible dangers that can affect the smooth functioning of your PC. These may be a small piece of adware or a harmful Trojan malware. In the present age, computer security threats are constantly increasing as the world is going digital. computer security threats
Types of Computer Security Threats
There are several types of computer security threats such as Trojans, Virus, Adware, Malware, Rootkit, hackers and much more. Check some of the most harmful types of computer Security Threats.
COMPUTER VIRUS
A Computer Virus is a malicious program, which replicates itself and infects the files and programs of your PC and can make them non-functional.
COMPUTER WORMS
A self-replicating computer program that spreads malicious codes, computer worms make use of the network to send copies of the original codes to other PCS. It can also go to the extent of sending transferring documents utilizing the email of the user.
SCAREWARE
Scareware is a malware that tricks victims to buy software by displaying fake virus alerts. A scareware infected PC may get pop-ups of fake malware threats and to get rid of those, users are prompted to purchase a fake anti-malware software.
KEYLOGGER
Also known as a keystroke logger, Keyloggers can track the real-time activity of a user on his computer. Keylogger runs in the background and records all keystrokes made by a user and passes the information to the hacker with the motive to steal password and banking details.
ROOTKIT
A rootkit is considered extremely dangerous as they appear to be legitimate files and deceives the computer user. Rootkit masks viruses and worms and makes them appear as necessary files. These are very difficult to remove and only an antivirus with the anti-rootkit feature can remove a rootkit.
Tips for Best Computer Security
For best computer security, you must follow certain guidelines, which are also called computer best practices. 1. Use the best antivirus software, which not only provides protection to your PC but also internet protection and guards against cyber threats. 2. Do not download untrusted email attachments and these may carry harmful malware. 3. Never download software from unreliable sites as they may come with a virus that may infect your system as soon as you install the software.
PLS HELP ASAP ILL GIVE BRAINLKEST PLS THANKS 20 POINTS
↓ Scroll Down to See Answer ↓
∧-∧ But Read the Explanation to Make Sure ∧-∧
Answer/Explanation:
These algorithms have undergone extensive security analysis and are continually tested to ensure that they provide adequate security. Cryptographic algorithms will usually use cryptographic keys and when these algorithms need to be strengthened, it can often be done by using larger keys.
Encryption uses complex algorithms to scramble data and decrypts the same data using a key provided by the message sender. Encryption ensures that information stays private and confidential, whether it's being stored or in transit. Any unauthorized access to the data will only see a chaotic array of bytes.
The strength of an algorithm, is defined both in terms of it's key size, as well as it's resistance to cryptanalytic attacks. We say an algorithm is broken if there exists an attack better than brute force. So, with AES and a 128-bit key, AES is considered "secure" if there is no attack that less than 2^128 work.
There seems to be an emerging requirement to specify cryptographic strength objectively rather than subjectively with adjectival descriptors such as weak, good or strong. It is expected that U.S. Government (USG) and industry will soon require specific quantitative data to define the point at which a cryptographic technology or product will satisfy user requirements.
Knowing that these 2 Choices Don't really look Right...
Because it our job = Wrong
Because encryption algorithm are always weak = Wrong
So It leads us to these...
To Prevent all Decryption = ?
To protect online Information = ?
But Base on the Information below:
Encryption can help protect data you send, receive, and store, using a device. That can include text messages stored on your smartphone, running logs saved on your fitness watch, and banking information sent through your online account.
Encryption is the process that scrambles readable text so it can only be read by the person who has the secret code, or decryption key. It helps provide data security for sensitive information.
Vast amounts of personal information are managed online and stored in the cloud or on servers with an ongoing connection to the web. It’s nearly impossible to do business of any kind without your personal data ending up in an organization’s networked computer system, which is why it’s important to know how to help keep that data private.
I would say the Answer is To Protect Online Information.
You could Read the Explanation Above If you want to Check.
[RevyBreeze]
algorithm to find the difference between two numbers second number is greater than first
Plzzz solve this problem
Answer:
You should concentrate yourself
Explanation:
1=x
2=y
x<y
hence proved solved thank me later
a data visualization tool that updates in real time and gives multiple outputs is called
Answer:
A data dashboard
Explanation:
A data visualization tool that updates in real time and gives multiple outputs is called data dashboard.
Why is data dashboard required?A data dashboard is a tool that many businesses use to monitor, examine, and present data—typically to acquire understanding of the general health of an organisation, division, or particular procedure.
Businesses utilise an interactive analytical tool called a data dashboard to analyse and monitor the effectiveness of their plans using high-quality KPIs.
These tools give businesses access to real-time data so they can extract useful insights and guarantee ongoing growth.
Making it simpler for data analysts, decision-makers, and everyday users to understand their data, acquire deeper insights, and make better data-driven decisions is the main goal of a data analytics dashboard.
Data dashboard is a term used to describe a real-time updating, multi-output data display tool.
For more details regarding a data dashboard, visit:
https://brainly.com/question/29854747
#SPJ6
The WordPress Widgets submenu is located where on the WordPress site?
Themes
Appearances
Background
Customize
Answer:
Appearances
Explanation:
In your dashboard, click on Appearance → Customize → Widgets. Choose the location where you'd like to place the widget on your site. Common options here include the Footer and Sidebar, but this may be different depending on your theme..
Go to Appearance > Widgets in the WordPress Administration Screens. Choose a Widget and either drag it to the sidebar where you wish it to appear, or click the widget, (select a destination sidebar if your theme has more than one) and click the Add Widget button.
[ RevyBreeze ]
what is Q-Basic statement
A statement (for the QBASIC) is a set of instructions written by using keywords or commands of QBASIC. Every programming language uses keywords as a statement with certain syntax. The statements are the first stored in the memory and executed only when the RUN command is given
Jacob is preparing a presentation on the health and social advantages of taking up a sport at an early age. Most of the slides in his PowerPoint presentation provide information using colorful graphics and charts. He plans to give notes to his audience to help them follow along.
Jacob is preparing a presentation on the health and social advantages of taking up a sport at an early age. Most of the slides in his PowerPoint presentation provide information using colorful graphics and charts. He plans to give notes to his audience to help them follow along.
How should Jacob format the Notes Master so it will be most helpful to his audience?
Do not include a slide image, leaving the maximum room to take notes.
Do not include a notes pane because graphics do not need to be annotated.
*Make the slide image large so the charts can be seen clearly.
Make the text pane large so the audience can draw their own charts.
Answer:
C. Make the slide image large so the charts can be seen clearly.
Explanation: Edg
The voltage/potential difference in a circuit is 12 volts, calculate the current that is flowing through the circuit if the resistance is 48 Ohms.
Current (I) = 0.25 ampere (A)
Power (P) = 3 watt (W)
Current (I) = 0.25 ampere (A) Power (P) = 3 watt (W) Steps: I = V R = 12 volt 48 ohm = 0.25 ampere (A) P = V2 R = (12 volt)2 48 ohm = 3 watt (W)
What is my mistake on this code? (Python)
Answer:
Explanation:
bakugo;sup shoto i didnt know you go on here too
the coding has no problems just go and get deki kaminary
In Super Mario Bros., you become Mario and your friend is Mario’s younger brother Luigi. Your job is to race through Mushroom Kingdom to save Princess Toadstool and avoid the enemy, Bowser. You can jump from and to different objects, picking up coins and other items to help you on your journey through the levels. What game genre (or combination of genres) best describes this game?
A.
strategy simulation
B.
action adventure
C.
RPG
D.
sports action
Not every design choice in your game interface requires having a thought process behind it.
True
False
Answer:
true
Explanation:
cause every design have it's own thought process and we also have our choice
Answer:
true
i agree with the person that answerd
Draw truth table for the following logic circuit:
(Please I really need help with this)
Keep Scrolling! :D
[tex] \rule{999pt}{66646pt}[/tex]
Tynker has a particular layout, with the blocks on the left, editor in the middle, and output on the right. Which word best describes this screen layout?
block-based
interface
editor
player
Interface best describes the layout of the screen. This is done by designers
in which they help to design the appearance and style of various software
and devices.
These characteristics help to ensure the users find them friendly and easy to
navigate through when performing various operations .
In this scenario, we were told that the layout has blocks on the left, editor in
the middle, and output on the right which are designs for easy navigation on
Tynker.
Read more about Interface here https://brainly.com/question/5080206
Answer:
interface
Explanation:
Where are 'if' and 'else' statements shown when printing a document in a word processor?
Answer the question and then your task is to:
Write an algorithm or sequence of instructions that include the IF statement for the document being printed.
Explanation:
cpt price
1. Explain 'Computer Ethics" ?
plz following me
Answer:
Computer ethics is a part of practical philosophy concerned with how computing professionals should make decisions regarding professional and social conduct. or the computer experts making the decision regarding the social and professional behaviour while working while with the computer tools and technology is called computer ethics.
Explanation: