1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ioda
4 years ago
6

Which of the following is the output of the code

Computers and Technology
1 answer:
olya-2409 [2.1K]4 years ago
3 0

Answer:

need to see code

You might be interested in
Is backing up computer files done on the hard drive?
8_murik_8 [283]
Yes but if the hard drive stops working you will lose your files so it's better to backup your files to a cloud like iCloud by Apple.
5 0
4 years ago
Read 2 more answers
In addition to key executives, there are other positions in a company that may be considered critical, or whose loss will be dif
Otrada [13]

Answer:

Explanation:

Every employee who works for a company plays an important role in his field. some of the key employees of a company is sales representative, marketing executives, human resource managers, etc

whereas in manufacturing sector additional employees are developers, manufacturing workers, quality testers, etc, which when leaves a company, there is always a chance for the employee to join the competitors which is a threat to integrity of a company

Plus particular field becomes unstable for that time until a good employee hire again for the same position.

If a network administrator leaves, the company may suffer from their network issues. as a network administrator maintain networks, troubleshoot with any network problem, checks the security of the network and many more, he plays a very important role in the company.

If a sales representative leaves the job from the company, sometimes it results as a great loss of a company as a sales representative is in direct contact with customers, and when they leave a job there are chances that they carry the customer with them which results in loss of business.

5 0
3 years ago
Assume we perform a known-plaintext attack against DES with one pair of plaintext and ciphertext. How many keys do we have to te
nasty-shy [4]

Answer:

2^{55} keys in a worst case scenario

Explanation:

So, Average will be : 2^{56} /2

2^{55}(Answer)

5 0
3 years ago
The function below takes two numeric parameters. The first parameter specifies the number of hours a person worked and the secon
Triss [41]

Answer:

def calculate_pay(total_worked_hours, rate_per_hour):

   if total_worked_hours > 40:

       return (40 * rate_per_hour) + ((total_worked_hours - 40) * 2 * rate_per_hour)

   else:

       return total_worked_hours * rate_per_hour

Explanation:

  • Create the calculate_pay function that takes 2 parameters.
  • Inside the function check whether the total_worked_hours is greater than 40 and then return the pay by calculating with the help of formula for work over 40 hours.
  • Otherwise return the pay by multiplying the total_worked_hours with rate_per_hour.
6 0
3 years ago
What branch of science helps avoid or minimize stress-related injuries at workplace?
Vlada [557]

The answer is : Ergonomics.  This improvement process removes risk factors that lead to injuries and allows for improved human performance and productivity. Applying ergonomic solutions can make employees more comfortable and increase productivity. It is important because when doing a job and our body is stressed by an awkward posture, extreme temperature, or repeated movement your musculoskeletal system is affected.

7 0
3 years ago
Other questions:
  • Which company provides the Loki Wi-Fi mapping service?
    10·1 answer
  • Of which of the following devices are point, drag, and click actions?
    15·1 answer
  • What is another name for a central processing unit? Computer Integrated circuit Microprocessor Transistor
    9·2 answers
  • How many 16ths are in 3/8 of an inch
    12·1 answer
  • "what type of index has an index key value that points to a data row, which contains the key value? "
    9·1 answer
  • Are you allowed to copy and paste answers on brainy to give answers to other people?
    5·2 answers
  • Which command do you use to save a document with a new name? Choose the answer.
    10·2 answers
  • Holly the Hacker has a list of 100,000 common passwords. She wants to use this list to break into UNIX-like systems that use a p
    14·1 answer
  • How does social network use message to entertain?
    14·1 answer
  • Anyone who do bug bounty hunt ?​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!