Answer:
discriminant = b * b - 4 * a * c
discriminant = b ** 2 - 4 * a * c
Explanation:
The operands are correct and in the right order (for python).
** is the operand for squaring something.
* is the operand for multiplying something.
- is the operand for subtracting something.
Answer: c)Roaming user profiles
Explanation:Roaming user profiles are those profiles that creates the copy from the local profile and get stored in the network server. Roaming user profiles haves the function of getting logged in any computer system that the user is processing by getting downloaded.
It has the advantage of not creating profiles on every computer system that user wants to login .Thus, the correct answer is option(c) because other profiles mentioned in the option cannot copy the profile in the server and so do not have capability to be accessed in other computer system.
Answer:
print("Let's play Silly Sentences!")
print(" ")
name=input("Enter a name: ")
adj1=input("Enter an adjective: ")
adj2=input("Enter an adjective: ")
adv=input("Enter an adverb: ")
fd1=input("Enter a food: ")
fd2=input("Enter another food: ")
noun=input("Enter a noun: ")
place=input("Enter a place: ")
verb=input("Enter a verb: ")
print(" ")
print(name + " was planning a dream vacation to " + place + ".")
print(name + " was especially looking forward to trying the local \ncuisine, including " + adj1 + " " + fd1 + " and " + fd2 + ".")
print(" ")
print(name + " will have to practice the language " + adv + " to \nmake it easier to " + verb + " with people.")
print(" ")
print(name + " has a long list of sights to see, including the\n" + noun + " museum and the " + adj2 + " park.")
Explanation:
Got it right. Might be a longer version, but it worked for me.
This idea is most closely related to the Layering in terms of how to reduce complexity.
<h3>Describe cybersecurity?</h3>
The term "cybersecurity" refers to the safeguarding of computer systems and networks against the leakage, theft, or destruction of data as well as the interruption of the services they offer.
Defense in depth is a technique used in cybersecurity that is one of the greatest ways to safeguard a computer or network. If one fails, it's likely that another will identify the issue. The approach to simplifying that is most in line with is called layering.
Thus, This idea is most closely related to the Layering in terms
For further details about cybersecurity, click here:
brainly.com/question/13016321
#SPJ1