1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
almond37 [142]
3 years ago
11

Making phone calls with a public box

Computers and Technology
1 answer:
AfilCa [17]3 years ago
8 0

Answer:

ja ok it is so eassssy.........................

You might be interested in
1. Potential incidents represent threats that have yet to happen. Why is the identification of the threat important to maintaini
lawyer [7]

Any test practices end-user he or she does by step by step process for quality testing. Some end-user will have a checklist to do while testing any software or hardware installing.

A hacking end-user has to do the test process if he or she has to follow some steps during testing.

<u>Explanation:</u>

This process is called penetration testing, in other words, it is called pen-testing.

1. In the digital world, security plays an important role. Before any potential incidents taking place, security threats have to handle properly. Before hacking takes place for pc or workstation or desktop, the end-user has to identify and take proper action.

Mostly all threats happen in c:\users\appdata folder in windows operating system

2. Penetration testing is used to for hacking purpose testing.

a. Step by step method is followed.

b. Best practice testing on network security, computer system, web system and find vulnerability check.

c. The pen test method is involved in legal achievements on network

d. To identify vulnerability assessment inside a network

6 0
2 years ago
The purpose of the trusted platform module is:
Elza [17]
A Trusted Platform Module is a specialized chip on an endpoint device that stores RSA encryption keys specific to the host system for hardware authentication. Each TPM chip contains an RSA key pair called the Endorsement Key. The pair is maintained inside the chip and cannot be accessed by software.
6 0
2 years ago
Read 2 more answers
Intro to cs 3.7 edhesive g=float(input("Enter your English test grade:")) if(g&lt;=64): print("F") if (g&gt;=65 and g&lt;69): pr
qwelly [4]

Answer:

The correct code for this question:

g=float(input("Enter your English test grade:")) #take input from user.

#check conditions

if (g>=100 and g<=90):

print ("A")

#g greater then equal to 100 and less then equal to 90.

if (g>=89 and g<=80):

print("B")

#g greater then equal to 89 and less then equal to 80.

if (g>=79 and g<=70):

print("C")

#g greater then equal to 79 and less then equal to 70.

if (g>=69 and g<=65):

print("D")

#g greater then equal to 69 and less then equal to 69.

if(g<=64):

print("F")

#g less then equal to 64.

else:

print ("Not a grade")

#not a grade or fail.

Explanation:

In this program, we use to take a value from the user and check the value from the various conditions. To check all the condition we use if-else statement and AND operator that check to the range to together.

If -else is a conditional operator. In that, If block is used to check the true part and else part takes false value, and AND is a logical operator that check the two range together  

5 0
2 years ago
_ is a model of computing in which computer processing, storage, software, and other services are provided as a shared pool of v
Jet001 [13]

Answer:

Cloud computing is the correct answer of this question.

Explanation:

Cloud computing presents a easy way of consuming databases, servers, repositories and a vast variety of web technology infrastructure.Cloud computing allows that can save considerable construction costs without relying on internal server resources and device requirements.Cloud computing is the provision of various resources over the Web.

8 0
3 years ago
Consider the following program:
Nostrana [21]

Answer:

this would be answer D

Explanation:

7 0
3 years ago
Other questions:
  • Vpns create a _____________ to transport information through public communications media.
    8·1 answer
  • Propose, two new, proudly South African ways, which you can visualize that the internet of things, can be used in at work to mak
    7·1 answer
  • Which of the following is a malicious program that can replicate and spread from computer to computer?
    8·2 answers
  • Which of the following should you NOT do when using CSS3 properties to create text columns for an article element? a. make the c
    12·2 answers
  • The partners of a small architectural firm are constantly busy with evolving client requirements. To meet the needs of their cli
    11·1 answer
  • Claire is trying to listen to her history professor's lecture, but her mind keeps wandering to thoughts about her plans for the
    5·1 answer
  • A recursive method may call other methods, including calling itself. A recursive method has:
    7·1 answer
  • Which factor is NOT used to determine who can be let go during a downsizing?
    8·2 answers
  • Do yall think I should be lonely and quit life!!
    8·2 answers
  • I have a top-secret recipe for the greatest cookie dough I have made and I want to keep the recipe a secret so I apply for a? *
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!