1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anon25 [30]
3 years ago
10

If you see ##### in a cell, you should

Computers and Technology
1 answer:
Hatshy [7]3 years ago
3 0
Re-read what you've typed in that cell see if you typed it correctly.
You might be interested in
Assume that to_the_power_of is a function that expects two integer parameters and returns the value of the first parameter raise
Bezzdna [24]

Answer:

The statement in python is as follows:

to_the_power_of(cube_side,3)

Explanation:

As stated as the requirement of the code segment, the statement takes as parameters a variable cube_side and a constant 3.

It then returns the volume of the cube; i.e. cube raise to power 3

<em></em>

<em>See full program below</em>

<em>def to_the_power_of(val,powe):</em>

<em>     result = val**powe</em>

<em>     print(result)</em>

<em>cube_side = float(input("Cube side: "))</em>

<em>to_the_power_of(cube_side,3)</em>

4 0
3 years ago
____ uses markup to define the structure and layout of a web document.
cupoosta [38]
HTML: Hyper Text Markup Language.

HTML is the markup language used for defining the structure, and very basics of a web page - one wouldn't be possible without this language!

HTML is combined with CSS (Cascading Style Sheet) to improve visuals, and combined with a language such as Javascript to add functionality and interaction with the web page.
8 0
3 years ago
Project: Semiconductor Chips
ohaa [14]

Answer:

Image result for construction of semiconductor

A semiconductor device is an electronic component that relies on the

Explanation:

8 0
2 years ago
What is a privacy data breach
kotykmax [81]

Answer: A privacy data breach occurs when personal information is stolen or lost or is collected, used or disclosed without authority. A privacy breach occurs when personal information is stolen or lost or is collected, used or disclosed without authority.

Explanation:

Examples of a  data breach might include:

Loss or theft of hard copy notes, USB drives, computers or mobile devices. an unauthorized person gaining access to your laptop, email account or computer network. sending an email with personal data to the wrong person.

7 0
1 year ago
John, an ethical hacker, is demonstrating a proof-of-concept IoT attack. For this demonstration, he used a jammer to jam and sni
scoundrel [369]

Answer:

BlueBorne Attack

Explanation:

If you're using a Bluetooth enabled device, whether it's a smartphone, laptop, smart TV, or any other IoT device, you risk malware attacks that can be remotely performed to take over your device, even without requiring any interaction from your side.

Security researchers have just discovered a total of 8 zero-day Bluetooth protocol vulnerabilities affecting more than 5.3 billion devices - from Android, iOS, Windows and Linux to the Internet of devices (IoT) - using technology short-range wireless communication

Using these vulnerabilities, security researchers at IoT security firm Armis created an attack, called BlueBorne, which could allow attackers to completely take over Bluetooth-enabled devices, spread malware, or even establish a “man” connection. -in-the-middle ”to gain access to device critical data and networks without requiring any victim interaction.

4 0
3 years ago
Other questions:
  • You are given a network of 10.50.24.0/21, which contains 2,048 addresses. what subnet mask should you use to divide this into fo
    7·1 answer
  • How do computers find servers, requests information from the server, and receives it?
    12·1 answer
  • She wants to sort the list based on the names of the first four gas in ascending order. Which command group dose she navigate to
    8·2 answers
  • What is the advantage of using Mail Merge Wizard when creating a mail merge?
    12·2 answers
  • Smart art can be used to create _____that highlights relationships betweeen two items
    8·2 answers
  • We already know that we can create a lunar lander application of the pipe-and-filter architecture style from three independent J
    6·1 answer
  • One of the most common uses of spreadsheet are
    12·1 answer
  • B. List any four major drawbacks of the first generation computer​
    10·1 answer
  • What are styles? built-in conditional formatting rules formatting applied with the Format Painter defined combinations of format
    15·2 answers
  • Which of these statements regarding mobile games is true?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!