omg a computer program
i love it
okay so i will assume taht you want the program to be in python
here we go
a = int(input("Enter a number ")
b = int(input("Enter another number ")
sum = a + b
def Digits(sum):
count = 0
while sum != 0:
sum //= 0
count += 1
return count
print(f"Sum is {sum} \nnumber of digits are {Digits(sum)}")
B. Summer monsoons bring heavy rainfall and winter monsoons create dry and arid conditions.
Yes, and no, social network can distract a student like YouTube or face book, while it can be used as a tool for studying and to put your google documents in the cloud. plus if a teacher posts homework on his/her website, and you happen to forget the paper bringing it home, you can just simply print it instead of having to explain to the teacher
Answer:
b. Customized auditing.
Explanation:
Vulnerability scanning is a process of finding or testing a system for weak or vulnerable spots which can be exploited by outsiders. It helps to boost the computer network in an organisation.
There are two types of vulnerability scanning, they are credentialed and non-credentialed scanning and they are defined as implied. The non credentialed scan requires no authorisation and credentials for scanning to take place while credentialed scan is the reverse.
The credentialed scanning provides baseline and customised auditing features.
Keeping in mind the role the order of precedence plays in equations, what would Excel display as the result of the following equation?
=(24+75)/(6*3)
=99/18
= 5.5
18)99.0.
90.0
9.0
D. 5.5