In this exercise we have to use the knowledge in computational language in python to write a code with circles and squares.
<h3>how to draw geometric figures in python?</h3>
<em>inputs = 100</em>
<em>radius</em>
<em> draw_circle(radius);</em>
<em> pendown()</em>
<em> begin_fill()</em>
<em> circle(radius)</em>
<em> end_fill()</em>
<em> penup()</em>
<em>left(90)</em>
<em>forward(radius*2)</em>
<em>right(90) </em>
<em>penup()</em>
<em>setposition(0,-200)</em>
<em>color("gray")</em>
<em>bottom_radius = int(input("What should the radius of the bottom circle be?: "))</em>
<em>draw_circle(bottom_radius)</em>
<em>draw_circle(bottom_radius)</em>
See more about python at brainly.com/question/18502436
...attend course
I hope my answer helps.
Answer:
B.) Open Office Impress
Explanation:
The options are:
A.) Open Office Writer
B.) Open Office Impress
C.) an outline
D.) photographs
Out of the above, the Impress is used for doing complex presentation, and its one of the best tool for it like PowerPoint. Its quite the same as PowerPoint, and it supports both ppt format as well as odp or the open document presentation format. You can make very complex presentations with the help of the Open office Impress.
Answer: A) Phishing
Explanation:
Phishing is type of attack in computer field that is processed to hack or steal the data of authorized user.The attacker acts as trusted party and then interacts with the authorized user through email or messages to gain confidential information like pin code, credit card number, login details etc of that user.
- According to the question, colleague is experiencing phishing as he has been requested for pin-code and credit-card number from a wrong source behaving as authorized bank.
- Other options are incorrect because ransomware is attack that asks for ransom from authorized user for reviving their access. on system. Spoofing is falsifying as some other party to receive advantage.
- Mail poisoning is inclusion of inappropriate details in email such as invalid email address etc.
- Thus, the correct option is option(A).
Answer: Depends on the power of the computer /computers and the UPS
Explanation: For someone who had a big connected network of computers and printers we would plug the computer or server into the UPS as well as the monitor and sometimes a printer sometimes the monitor was plugged into the wall
When you get a UPS you must plug it in for a certain time could be hours or even a day. A USP has a big battery in it and you must charge it (sometimes it comes semi-charged but you must plug it in to strengthen it. )
there are two connector wires that you affix to the battery and you must put a lot of strength into it to make it secure.
So in closing, you can get away with two like a desktop and a laptop.
Read your documentation that comes with the UPS