Answer:
File manager
Explanation:
From the list of options 1 to 4, only option (2) is correct
Explaining the options one after the other
- Web browser: It lets users access the internet
- File Manager: Used to create and manage files/folders
- User Interface: Means which the user of a computer interacts with the computer
- File Reader: Used to read the content of a file. e.g. Adobe reader for pdf files, Notepad for text files, etc.
Having explained the options one after the other, <em>the file manager </em>is the answer to this question.
Answer:
name = []
price = []
for i in range(0,8):
item_name = input('name of item')
item_price = input('price of item')
name.append(item_name)
price.append(item_price)
for i in range(0, 8):
print(name[i], '_____', price[i])
Explanation:
Python code
Using the snippet Given :
Apples 2.10
Hamburger 3.25
Milk 3.49
Sugar 1.99
Bread 1.76
Deli Turkey 7.99
Pickles 3.42
Butter 2.79
name = []
price = []
#name and price are two empty lists
for i in range(0,8):
#Allows users to enter 8 different item and price choices
item_name = input('name of item')
item_price = input('price of item')
#user inputs the various item names and prices
#appends each input to the empty list
name.append(item_name)
price.append(item_price)
for i in range(0, 8):
print(name[i], '_____', price[i])
# this prints the name and prices of each item from the list.
Answer:
A. Lookup
Explanation:
You would use the Lookup field to store a value from another table.
Answer: rootkit
Explanation:
Hi, A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.
A rootkit provides continued privileged access to a computer while hiding its presence. Because of this hiding characteristic it is very difficult to detect.
Once a rootkit has been installed, it allows someone to have total remote control of a computer and do things such as files executions and system changes.