I don’t know if you will get this right but
I think it can be A , or. D
Answer:
First two statements: yes. Last two: not so much.
But many of the better ones do have advanced degrees, but some don't.
The laboratory statement is silly; they sit behind a set of screens figuring out stuff and writing code.
Answer:
1. tablets are less portable than smartphones
2. smartphones are considered necessities and tablets are considered luxuries
3. smartphones are personal devices; tablets are usually shared
4. Tablets have larger screens for more extensive use of applications as opposed to the smaller, less versatile mobile phone screens.
Answer:
Written in Python
import math
principal = 8000
rate = 0.025
for i in range(1, 11):
amount = principal + principal * rate
principal = amount
print("Year "+str(i)+": "+str(round(amount,2)))
Explanation:
This line imports math library
import math
This line initializes principal amount to 8000
principal = 8000
This line initializes rate to 0.025
rate = 0.025
The following is an iteration from year 1 to 10
for i in range(1, 11):
This calculates the amount at the end of the year
amount = principal + principal * rate
This calculates the amount at the beginning of the next year
principal = amount
This prints the calculated amount
print("Year "+str(i)+": "+str(round(amount,2)))
Answer:
TRUE
Explanation:
A rootkit is a collection of computer software, typically malicious, that is designed to grant an unauthorized user access to a computer or certain programs. Once a rootkit is installed, it is easy to mask its presence, so an attacker can maintain privileged access while remaining undetected.
Rootkit detection is difficult because a rootkit maybe able to subvert the software that is intended to find it.
Rootkits work by using a process called modification (the changing of user account permissions and security).
Rootkits are not malware themselves, but rather a process used to deploy malware on a target.
Therefore, it is TRUE that a rootkit is software and file folders that are hidden from view and permit viruses, spyware, and malware to be installed on a PC without the knowledge or consent of a user.