1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ycow [4]
1 year ago
7

Which of the following is not true about Mac computers? The current version of OS X is called El Capitan. Macs come with a varie

ty of useful programs already installed. Boot Camp is a program that allows you to install and run Windows on a Mac Macs have a reputation for being unsecure, unstable and difficult to use.​
Computers and Technology
1 answer:
horrorfan [7]1 year ago
3 0
Mac’s current OS is El Capitan and Macs have a reputation to be unsecure. Both of these are not true.
You might be interested in
Write a python program to read four numbers (representing the four octets of an IP) and print the next five IP addresses. Be sur
sdas [7]

Answer:

first_octet = int(input("Enter the first octet: "))

second_octet = int(input("Enter the second octet: "))

third_octet = int(input("Enter the third octet: "))

forth_octet = int(input("Enter the forth octet: "))

octet_start = forth_octet + 1

octet_end = forth_octet + 6

if (1 <= first_octet <= 255) and (0 <= second_octet <= 255) and (0 <= third_octet <= 255) and (0 <= forth_octet <= 255):

   for ip in range(octet_start, octet_end):

       forth_octet = forth_octet + 1

       if forth_octet > 255:

           forth_octet = (forth_octet % 255) - 1

           third_octet = third_octet + 1

           if third_octet > 255:

               third_octet = (third_octet % 255) - 1

               second_octet = second_octet + 1

               if second_octet > 255:

                   second_octet = (second_octet % 255) - 1

                   first_octet = first_octet + 1

                   if first_octet > 255:

                       print("No more available IP!")

                       break

       print(str(first_octet) + "." + str(second_octet) + "." + str(third_octet) + "." + str(forth_octet))

else:

   print("Invalid input!")

Explanation:

- Ask the user for the octets

- Initialize the start and end points of the loop, since we will be printing next 5 IP range is set accordingly

- Check if the octets meet the restrictions

- Inside the loop, increase the forth octet by 1 on each iteration

- Check if octets reach the limit - 255, if they are greater than 255, calculate the mod and subtract 1. Then increase the previous octet by 1.

For example, if the input is: 1. 1. 20. 255, next ones will be:

1. 1. 21. 0

1. 1. 21. 1

1. 1. 21. 2

1. 1. 21. 3

1. 1. 21. 4

There is an exception for the first octet, if it reaches 255 and others also reach 255, this means there are no IP available.

- Print the result

8 0
3 years ago
Which devices are most likely to communicate with the internet? Select 3 options.
Anon25 [30]
<h2>Answer:</h2>

<h3>smart phone </h3>

<h3>cars </h3>

<h3>delivery trucks</h3>
5 0
3 years ago
Which of the following examples illustrates the Crowding Out Effect?
maks197457 [2]

your answer is c to what your looking for



6 0
3 years ago
Francescas spend 25 minutes on the Internet yesterday, if this is 5/6 of the time she spent on the computer, how long did she sp
astra-53 [7]
She spent 30 minutes on the computer total, so 5 min was not on the internet


5 0
3 years ago
Key physical database design decisions typically do not include: A) choosing the storage format for each attribute from the logi
7nadin3 [17]

Answer: B) conducting requirements structuring.

Explanation:

The Key physical database design decisions usually include: deciding on the storage format as well as physical storage that makes access to database more efficient, design practices which aid quick retrieval, and attributes grouping into physical records. So the following are key design decisions but conducting requirements structuring is not.

A) choosing the storage format for each attribute from the logical database model.

C) arranging related records in secondary memory so that individual and groups of records can be stored, retrieved, and updated rapidly.

D) selecting media and structures for storing data to make access more efficient.

E) grouping attributes from the logical database model into physical records

4 0
2 years ago
Other questions:
  • Define inheritance. give an example
    11·1 answer
  • To create a chart you need to select at least ___ in a range of data
    15·1 answer
  • Describe some ways that you personally use information technologies differently than you did just a few years ago
    11·1 answer
  • Type the correct answer in the box. Spell all words correctly. How is it possible to access data from any location? Storing data
    12·1 answer
  • A write once, read many (worm) disc is a common type of _____.
    6·1 answer
  • Wht is these things Aᔑ bʖ cᓵ d↸ eᒷ f⎓ g⊣ h⍑ i╎
    15·2 answers
  • MP3 BrainPoP Quiz
    13·2 answers
  • Suppose you are asked to design a rotating disk where the number of bits per track is constant. You know that the number of bits
    6·1 answer
  • How does Virtual Reality help to make work experiences more inclusive?
    13·1 answer
  • Which of the following is NOT a career in the Information Support and Services pathway?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!