The PSU or most commonly known as the Power Supply.
Answer:
When Patricia checks her email use:
POP3
TCP
IP
When Patricia brows a website and log in to post a comment use:
HTTP
TCP
IP
LDAP
Explanation:
Email protocol
Patricia starts to check her email, the email application uses the protocol POP3.
The protocol TCP makes a connection with the server and transport the data.
Patricia receives her emails with the protocol IP on her computer.
Website protocol
Patricia started to surf and the protocol HTTP makes a connection with the internet.
The protocol TCP makes a connection with the server and transport the data.
With the protocol IP, she receives the website data.
With the protocol LDAP, Patricia makes a login to post the comment.
Answer:
TAX_RATE = 0.20
STANDART_DEDUCTION = 10000.0
DEPENDENT_DEDUCTION = 3000.0
gross_income = float(input("Enter the gross income: "))
number_of_dependents = int(input("Enter the number of dependents: "))
income = gross_income - STANDART_DEDUCTION - (DEPENDENT_DEDUCTION * number_of_dependents)
tax = income * TAX_RATE
print ("The income tax is $" + str(round(tax, 2)))
Explanation:
Define the <em>constants</em>
Ask user to enter the <em>gross income</em> and <em>number of dependents</em>
Calculate the <em>income</em> using formula (income = gross_income - STANDART_DEDUCTION - (DEPENDENT_DEDUCTION * number_of_dependents))
Calculate the <em>tax</em>
Print the <em>tax</em>
<em />
round(number, number of digits) -> This is the general usage of the <em>round</em> function in Python.
Since we need <u>two digits of precision</u>, we need to modify the program as str(<u>round(incomeTax, 2</u>)).
We must be careful of when retrieving messages/data from mobile devices in public because of Bluebugging. It is a form of attack through the use of Bluetooth. It is more than just Bluesnarling and Bluejacking. It goes beyond, allowing the thieves to take control of a device.