Question 1: To tell what will happen when an if-statement is false.
Question 2: The = should be ==
elseif should be elif
The else should have a :
Question 3: All algorithms can only do number calculations.
Question 4: and
Question 5: To make a follow-up True/ False decision
Question 6: if (text1 > 15):
Question 7: if (text1 == 78):
Question 8: if (num1 != num2):
Question 9: >=
Question 10: 4
Question 11: 3
Question 18: a < b and a != b
Question 19: !=
Sorry about 12 - 17 and 20 i can't seem to find those questions guessing you wanted edhesive. I dont have an account on it.
Answer:
Do you want me the money for the policy that has been canceled
Answer:
1. List the fields needed to gain information
2. Break down the date into smaller parts
3. identify the fields holding stored data
4.distribute the fields into tables by subject
5. identify the common fields for linking tables
Explanation:
edge 2021
Cyber vulnerabilities to dod systems may include all of the above Options.
<h3>What is Cyber vulnerabilities?</h3>
In cybersecurity, a vulnerability is known to be any kind of weakness exist with the aim to be exploited by cybercriminals to be able to have unauthorized access to a computer system.
Note that in the case above, Cyber vulnerabilities to dod systems may include All of the above Options.
Learn more about cyber vulnerabilities from
brainly.com/question/7065536
#SPJ11