When you save something to the Desktop on a school computer, the drive letter it will save to the C drive.
<h3>What is a C drive?</h3>
C drive is that part of the computer that contains the operating system and files of the system. The files on which we worked are saved on the C drive of the system.
This is a type of hard drive. The work we have done on the system is automatically saved on the drive. We can easily find the C drive on the computer's file explorer. It automatically saved the data, but you can save manually the data of the D drive.
Thus, the drive letter it will save to the C drive.
To learn more about C drive, refer to the link:
brainly.com/question/2619161
#SPJ1
Answer:
The program in Python is as follows:
num1 = int(input())
num2 = int(input())
if num1 >=0 and num2 >= 0:
print(num1+num2)
elif num1 <0 and num2 < 0:
print(num1*num2)
else:
if num1>=0:
print(num1**2)
else:
print(num2**2)
Explanation:
This gets input for both numbers
num1 = int(input())
num2 = int(input())
If both are positive, the sum is calculated and printed
<em>if num1 >=0 and num2 >= 0:</em>
<em> print(num1+num2)</em>
If both are negative, the products is calculated and printed
<em>elif num1 <0 and num2 < 0:</em>
<em> print(num1*num2)</em>
If only one of them is positive
else:
Calculate and print the square of num1 if positive
<em> if num1>=0:</em>
<em> print(num1**2)</em>
Calculate and print the square of num2 if positive
<em> else:</em>
<em> print(num2**2)</em>
Answer:
In a digital camera, exactly the opposite happens. Light from the thing you are photographing zooms into the camera lens. This incoming "picture" hits the image sensor chip, which breaks it up into millions of pixels. The sensor measures the color and brightness of each pixel and stores it as a number.
Explanation:
Answer and Explanation:
Advanced Persistent Threat abbreviated as APT is a type of cyber attack which gives access to the unauthorized user to enter the network without being detected for a long period.
APTs are generally sponsored by the government agencies of the nation or large firms. For example, one of the ATPs used was Stuxnet in the year 2010 against Iran, in order to put off the nuclear program of Iran.
Some of the practical strategies for protection against APT are:
- Sound Internal Auditing
- Strong Password Accessing Policies
- Stringent policies for accessing any device
- Introduction and implementation of multi factor authentication
- Strong IDs and sound honeypot solutions
Answer:
pls type clearly to understand i can't understand