Answer:
result 1 = false;
result 2 = true;
Explanation:
result 1 = (43 < -77 && 1! = 10)
43 < -77 = false
1 != 10 = true
for any false && true logical operator, it returns false
result 1 = false;
false = 90 < -77 || -1 < 43
90 < -77 = false
-1 < 43 = true
for any false || true logical operator, it returns true
result 2 = true;
Answer:
def compute_pay(number_of_hours, rate_of_pay):
if number_of_hours > 40:
pay_for_week = (40*rate_of_pay)+((number_of_hours-40)*\
(rate_of_pay+rate_of_pay*0.5))
else:
pay_for_week = number_of_hours*rate_of_pay
if pay_for_week >= 375:
print("Paying %d by direct deposit" % pay_for_week)
else:
print("Paying %d by mailed check" % pay_for_week)
Explanation:
- We define the computer pay function that receives the number of hours worked in a week and the rate of pay
- From the test cases we deduce that if a worker works more than 40 hours a week an extra payment is given, you can calculated it as follow: (40 * rate_of_pay) + ((number_of_hours - 40) * (rate_of_pay + rate_of_pay * 0.5))
- If a worker works less than 40 hours the payment is calculated as follow: pay_for_week = number_of_hours * rate_of_pay
- If the pay for week is equal or greater than 375 we print a payment by direct deposit otherwise we print payment by mailed check
Answer:
1. Undo 2. Font Type 3. Font Size 4. Bold Font 5. <em>Italics </em>6. Word Color 7. Document Margins
Explanation:
Did you know that all of these answers are how to format a document?
Answer:
1. Clients and servers—how services such as e-mail and web pages connect using networks.
2. IP addresses—how devices on a network can be found.
3. Network hubs, switches and cables—the hardware building blocks of any network.
4. Routers and firewalls—how to organize and control the flow of traffic on a network.
Based on the information provided, this user is a victim of phishing.
<h3>What is phishing?</h3>
Phishing can be defined as a type of cyberattack which involves making an attempt to obtain sensitive user information such as a password, especially by disguising as a trustworthy entity in an electronic communication (email), which is usually over the Internet.
In this context, we can infer and logically deduce that this user is a victim of phishing because he or she received an email from an unknown source with a link to a website asking for their password.
Read more on phishing here: brainly.com/question/23850673
#SPJ1