1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MatroZZZ [7]
3 years ago
13

The point at coordinates (2, -18) is in what direction from the origin?

Computers and Technology
1 answer:
Arada [10]3 years ago
3 0
I wish i could give an answer but see in dont think straight
You might be interested in
During the _____ of the systems development life cycle (SDLC), an information system is operating, enhancements and modification
Neporo4naja [7]

Answer:

Maintenance Phase

Explanation:

One of the concepts employed in project management for describing stages involved when carrying out an information system development project is the systems development life cycle (SLDC). The cycle which starts from carrying out a feasibility study and ends in maintenance is a highly used conceptual model. There are 5 major stages or phase and they are the; Requirement Phase, Design Phase; Implementation Phase, Test Phase, and the Maintenance phase. The maintenance phase comes when testing has been complete and all enhancement and modifications have already been developed, and the system is operating.

5 0
3 years ago
Randall is unhappy because the server at his college blocks some emails with attachments, so he is unable to receive a particula
tatiyna
If the school has age restrictions it can read 18+ content but it depends on the school. Viruses as by my past experiences with friends can transfer from anywhere to another place because it disables security connections.

The answer is A.
8 0
3 years ago
Read 2 more answers
The command-line interface tells a user that it's ready to receive commands by displaying a specific set of characters called a(
Brrunno [24]

Answer:

B) prompt

Explanation:

Prompt tells a user that it's ready to receive commands by displaying a specific set of characters.

For example in <em>windows</em> it can be:

C:\Temp>, The prompt states that user is currently in <em>C </em>drive <em>Temp</em> directory.

in <em>Linux </em>based operating systems it can be:

[email protected]:~/Documents$

where it is in the format [email protected]:~directory$

5 0
3 years ago
Write a short program using Python that will:
Alexxx [7]

Answer:

// program in Python to check perfect number

#function to find number is perfect or not

def is_Perfect_Number(n):

   #total variable

   tot = 1

   i = 2

   #sum of all divisor of number

   while i*i<=n:

       if n%i==0:

           tot = tot + i + n/i

       if tot == n and n != 1:

           return 1

       i = i+1  

   return 0

#read until user enter a perfect number

while True:

   #read integer

   num = int(input("Input an integer: "))

   #call the function

   if(is_Perfect_Number(num)):

       print(num,"is perfect number")

       #if perfect number break

       break

   else:

       print(num,"is not a perfect number")

       #ask again

   print("try again.")

Explanation:

Read number from user and then call the function is_Perfect_Number() with  parameter "num".This will find the sum of all divisor of number.If sum is  equal to number then it will return 1 else return 0.If the number is not  perfect then it will again ask to enter a number until user enter a perfect  number.

Output:

Input an integer: 24

24 is not a perfect number                                                                                                

try again.                                                                                                                

Input an integer: 28                                                                                                      

28 is perfect number

6 0
3 years ago
The purpose of the trusted platform module is:
Elza [17]
A Trusted Platform Module is a specialized chip on an endpoint device that stores RSA encryption keys specific to the host system for hardware authentication. Each TPM chip contains an RSA key pair called the Endorsement Key. The pair is maintained inside the chip and cannot be accessed by software.
6 0
3 years ago
Read 2 more answers
Other questions:
  • ZO
    14·1 answer
  • What is one problem you should keep in mind when researching information on the Internet?
    6·2 answers
  • A network administrator wants to increase the speed and fault tolerance of a connection between two network switches. To achieve
    9·2 answers
  • Employees at the Red Bluff Golf Club &amp; Pro Shop have the opportunity to become certified trainers if they log enough hours.
    13·1 answer
  • Write the constructor for the Theater class. The constructor takes three int parameters, representing the number of seats per ro
    7·1 answer
  • PLEASE HURRY PLEASE HELP THIS CLASS ENDS TODAY AND I NEED HELP
    7·1 answer
  • Create html code showing heading tags​
    6·1 answer
  • Mention five of the format tools use to edit a picture in a word document<br>​
    13·1 answer
  • We begin with a computer implemented in a single-cycle implementation. When the stages are split by functionality, the stages do
    13·1 answer
  • For her presentation on Italy, Matilda used a red background with light green text. When her friend critiqued her presentation,
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!