1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
uranmaximum [27]
3 years ago
10

What is output?

Computers and Technology
1 answer:
andriy [413]3 years ago
6 0

Answer:

The output of the following code is 3.

Explanation:

In the following Python Programming Language, the output is 3 because the variable x is equal to 21, then the user check the condition is the variable x is greater than 21 then print it print 1, otherwise the user check that the variable x is less than 21 then print 2, otherwise it print 3. So, the variable x is not greater than 21 or not less than 21, it is equal to 21. That's why the code execute the else block and print 3.

You might be interested in
Secure Hashing Algorithm (SHA) is an algorithm for generating cryptographically secure one-way hash, published by the National I
Naily [24]

Answer:

64 byte.

It's not bit is byte.

Explanation:

Secure Hash Algorithms (SHA) :- These are a family of cryptographic hash functions. There are basically four types of secure hash algorithms for generating cryptographically secure one-way hash.They are as following:-

SHA-0

SHA-1

SHA-2

SHA-3

SHA -2 consists of SHA-512 and the block size used by it is 64 byte or 512 bits.

8 0
3 years ago
A job placement agency helps match job seekers with potential employers. The agency would like to design a simulation in order t
g100num [7]

Answer:

B

Explanation:

The point of simulating would be to eliminate the part of having to go through un patential applications and save time.

5 0
3 years ago
What is the purpose of adding a footnote or an endnote in your research paper?
lions [1.4K]
They add clarifying information to a document. They provide details the reader may be unfamiliar with, and saving them from having to look them up (words, places or sources.)
3 0
4 years ago
With the help of what memory a computer can read as well as write or modify data
vivado [14]

Answer

Hi,

With the help of <u>random access memory(RAM)</u> a computer can read as well as write or modify data.

Explanation

Memory is a vital element in computers because it allows it to perform simple tasks. The random access memory/read write memory/main memory/primary memory is a volatile memory data stores the programs and data that the CPU requires for execution. This type of memory can easily be written as well as read from using the software associated with its functioning.

Hope this Helps!

6 0
3 years ago
21. The most overlooked people in information security are:
yulyashka [42]

Answer: D. janitors and guards

Explanation:

Information security simply means the protection of information from an unauthorized use or access.

The most overlooked people in information security are the janitors and the guards. Due to the fact that they're at the bottom of the organizational chart, they tend to be overlooked and not given the respect that they deserve.

8 0
3 years ago
Other questions:
  • BITS wants to store information about the supervisors, including their supervisor number and the relationship to consultants. Su
    15·1 answer
  • The keyboard shortcut to save a file is _______.<br><br> Ctrl-s
    12·1 answer
  • Write a machine-language program to add the three numbers 2, –3, and 6 and output the sum on the output device. Write it in a fo
    11·1 answer
  • Rhea has been asked to interview the new CEO of an energy company. She has scheduled a meeting with him in the company’s meeting
    9·2 answers
  • What will the declaration below do to its target?
    9·1 answer
  • Which view is most often used to reorder slides in a presentation that has already been created?
    15·2 answers
  • Blockchain is often associated with Bitcoin and the financial services industry. However, it is applicable to almost every indus
    13·1 answer
  • Why computer known as tool of information​
    10·1 answer
  • _____ oversee the work of various types of computer professionals and must be able to communicate with people in technical and n
    5·1 answer
  • 30 POINTS FOT THE ANSWER FAST
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!