1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sophie [7]
2 years ago
8

Task 2

Computers and Technology
2 answers:
USPshnik [31]2 years ago
6 0
4.
3.
1.
5.
2.
I rearranged them so the program would make sense by arranging the interaction in a logical order then placing input statements in between
Damm [24]2 years ago
4 0
4.
3.
1.
5.
2.
I arranged it in an orderly and most interactive manner including it with the Scanner input class
You might be interested in
nancy finds it difficult to locate emails in her inbox . what action should she take to locate a particular type of email instan
Anuta_ua [19.1K]
Well, what Nancy can do is either search for her e-mail and access it or Nancy can restart her device.      :D Hope this helps

8 0
3 years ago
What is the Difference between raw_input and input?
erik [133]
The difference between raw_input and input is

when you're using raw input,  it returns a string and input and tries to run the input as phyton expression

hope this helps
3 0
3 years ago
What is the exclusive legal right granted to all authors and artists that gives them sole ownership of their work to print, publ
Arisa [49]
The answer is copyright like for example if you copy and paste a essay offline and don’t give credit to the author it called copyright
7 0
3 years ago
Read 2 more answers
A new company is upgrading a media workstation. The computer will be predominantly used for graphic intensive presentations, sli
Lilit [14]

Answer:

The answer is letter A

Explanation:

High-end video, high-end audio, multicore processor

4 0
3 years ago
Should a social network own our social data? Is it an invasion of privacy for social networks to collect and use the information
Svetradugi [14.3K]

Answer:

The description for the given question is described in the explanation section below.

Explanation:

No, we don't even own our identity data on social networking sites. It may be said as permission is needed as an factor for recognizing an acceptable interpretation and solution to a circumstance as well as a method to be followed.

  • They would conclude that, in contemplating the data generated from social networking, this could be recognized that although the data that they left as our electronic fingerprints must be used with applications that can provide the businesses with the appropriate strategy to best reach the consumer.
  • With all this into consideration, the method of information gathering does not include personal identifying information, and also the reality that we must be made mindful of what details has been accessed as well as the right to get out of obtaining such details from the social platform.
3 0
3 years ago
Other questions:
  • What operating system uses Fastboot?
    10·2 answers
  • I need help RIGHT NOW PLZ!!!!!!!!!!!!! this is due in 5 mins
    13·1 answer
  • What to do when you strip a screw
    10·2 answers
  • The labels on the tab buttons on the Driver tab of the Windows Device are Driver Details, Update Driver, Roll Back Driver, Unins
    12·1 answer
  • Anna's computer has slowed down. How might she improve her computer's performance? Select one of the options below as your answe
    10·1 answer
  • How many syllables does snail have
    12·1 answer
  • To control how and when the slides should appear during the slide show, we use the__________________ feature​
    12·1 answer
  • Which is an effect of short-term environmental changes?
    8·1 answer
  • PLSS HELP ASAP ILL GIVE BRAINLIEST THANKS
    11·1 answer
  • What is a primary risk to the Workstation Domain, the Local Area Network (LAN) Domain, and the System/Application Domain
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!