1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MaRussiya [10]
3 years ago
7

In python,_______ are used to define the conditions necessary for a while loop to run.

Computers and Technology
2 answers:
-BARSIC- [3]3 years ago
8 0

Answer:

Relational Operators

Explanation:

We can make a while loop run only when some variable or whatever is relative to something else.

The valid operators are:

<, >, =, <=, >=, and =!

Hope this helped!

luda_lava [24]3 years ago
8 0

Answer:

sorry not sure

Explanation:

You might be interested in
Consists of forging the return address on an email so that the message appears to come from someone other than the actual sender
Pavlova-9 [17]

Answer:

C. Spoofing.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.

Spoofing can be defined as a type of cyber attack which typically involves the deceptive creation of packets from an unknown or false source (IP address), as though it is from a known and trusted source. Thus, spoofing is mainly used for the impersonation of computer systems on a network.

Basically, the computer of an attacker or a hacker assumes false internet address during a spoofing attack so as to gain an unauthorized access to a network.

4 0
3 years ago
Which line of code will print I like to code on the screen? print("I like to code") print(I like to code) print("I LIKE TO CODE"
Bad White [126]

Answer:

print("I like to code")

Explanation:

In the Programming Languages, print() function is used to print any string, display any output or both at the same time as well as we can print it one by one. We can also print addition, subtraction, multiplication and other problems directly without saving it in other objects or variables.

In the above statement, the correct method of printing any string is to write that string inside the parameter with a double-quote.

The second option is incorrect because in it double-quote is not used.

The third option is incorrect because the following sequence is not correct.

4 0
3 years ago
Read 2 more answers
a ____ is a duplicate of a file, program, or disk that you can use in case the original is lost, damaged, or destroyed.
AleksAgata [21]
A backup is a duplicate of the file, program or disk that you can use in case the original is lost, damaged or destroyed.
3 0
3 years ago
Tick the correct option.
sashaice [31]

Answer:

print

plz follow me

.........

4 0
2 years ago
Read 2 more answers
Fnaf ships anyone?<br><br> Idk I’m bored so please tell me I’m all ears ✨
zheka24 [161]
Foxy n mangle all the way.
4 0
2 years ago
Read 2 more answers
Other questions:
  • Write a program that asks the user to enter a number within the range of 1 through 10. Use a switch statement to display the Rom
    13·1 answer
  • A result of the Gibbons v. Ogden (1824) decision was that states​
    11·1 answer
  • Assume that isIsosceles is a bool variable, and that the variables isoCount, triangleCount, and polygonCount have all been decla
    11·1 answer
  • 3) An example of interactive web page is<br>​
    11·1 answer
  • The interaction between information technology and organizations is influenced___________.A) solely by the decision making of mi
    12·1 answer
  • A ____ typically rests on the desk or other flat surface close to the user’s computer, and it is moved across the surface with
    13·1 answer
  • This OS was created by a developer named Torvalds.
    7·1 answer
  • I'd: 9872093250, password: qqqqq, join the meeting​
    11·1 answer
  • Complete the sentence.
    5·1 answer
  • Choose the correct term to complete the sentence.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!