1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gre4nikov [31]
3 years ago
14

.In Python, comments begin with the comment marker and continue ______.

Computers and Technology
1 answer:
earnstyle [38]3 years ago
4 0

Answer:

b. to the end of the line

Explanation:

Great question, it is always good to ask away and get rid of any doubts that you may be having.

Python is a unique language compared to other languages such as Java and C++. In Python comments are started with the comment marker which is the hashtag (#) symbol and continues <u>to the end of the current line</u>. Once the line ends the next line is <u>NOT</u> automatically considered a comment unless another hashtag is placed.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

You might be interested in
Universal containers has two teams: Sales and Services. Both teams interact with the same records. Sales users use ten fields on
Oxana [17]

Answer:

Two profiles, one record type, two page layouts.

Explanation:

Record types and functions allow you to present forward different business processes, pick-list values, as well as page layouts to diverse range of users based on their profiles.

Going by the question, we can conclude that the minimum necessary configuration in order to meet the requirement in the question above are:Two profiles, one record type, two page layouts.

6 0
3 years ago
An organization is planning to implement a VPN. They want to ensure that after a VPN client connects to the VPN server, all traf
Sonja [21]

Answer:

B. Full tunnel.

Explanation:

In this scenario, an organization is planning to implement a virtual private network (VPN). They want to ensure that after a VPN client connects to the VPN server, all traffic from the VPN client is encrypted. The best method to meet this goal is to use a full tunnel.

A full tunnel is a type of virtual private network that routes and encrypts all traffics or request on a particular network. It is a bidirectional form of encrypting all traffics in a network.

On the other hand, a split tunnel is a type of virtual private network that only encrypts traffic from the internet to the VPN client.

Hence, the full tunnel method is the most secured type of virtual private network.

7 0
3 years ago
Develetech has a security policy that mandates a basic security feature for mobile device access. What is this basic security fe
kirill [66]

Answer:A password or a PIN

Explanation: Develetech is a industry that has the a internet page and can also be used in the mobile devices. There is particular authorization that the organization provides to an individual user for accessing of the services to maintain the security .The security is maintained by providing the devices with an encrypted text that is known as the password. The user has to enter the pin or password to execute the service on device.

5 0
3 years ago
16235 to the nearest ten thousand
masha68 [24]
16235 to the nearest ten thousand would be 20,000.

Hope this helps :)
~ Davinia.
7 0
3 years ago
Read 2 more answers
Given that slotted ALOHA contains three active stations: X, Y, Z. The probability of generating frames by these stations in a ti
Stella [2.4K]

Answer:

Throughput of X, Y, Z will be 0.081

The network throughput will be 0.243

Explanation:

Throughput of X will be Tx = Px*(1-Py)*(1-Pz)=0.1*0.9*0.9=0.081

Throughput for Y and Z can be calculated in same way.

Throughput of network = Tx+Ty+Tz=0.081+0.081+0.081=0.243

3 0
3 years ago
Other questions:
  • What is pressure?
    7·2 answers
  • When a piece of shiny silver jewelry gets tarnished, what has happened?
    15·1 answer
  • Finding your style in photography is about ___
    10·2 answers
  • The answer for this question?
    5·1 answer
  • Which of the following is used to encrypt web application data?
    11·1 answer
  • A computerized spreadsheet program is useful for
    6·2 answers
  • Linda is the owner of Souvenirstop, a chain of souvenir shops. One of the shops is located at the City Centre Mall. Though the s
    15·1 answer
  • What is a lan adapter
    7·2 answers
  • One key feature of malware is that it:
    13·1 answer
  • So, I have an Cru__ on this boy in school and his name is Bray but Yeah.............Can someone help me
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!