1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kherson [118]
3 years ago
6

Alexi is writing a program which prompts users to enter their age. Which function should she use?

Computers and Technology
2 answers:
Monica [59]3 years ago
5 0

Answer:

int()

Explanation:

i think so

Yuki888 [10]3 years ago
3 0

Answer:

B int()

Explanation:

You might be interested in
ystem, the design of which was developed using customary structured methods. To manage the intricacy of the application developm
Soloha48 [4]

Answer:

Organized plan is utilized to change the auxiliary examination (for example modules and their interrelation) into a straightforward graphical structure. It is essentially done in two stages:  

1. Transform Analysis  

2. Transaction Analysis  

For showing control stream in organized investigation we use Flow diagrams, But for indicated choice in organized examination, we frequently use choice tree. In choice tree we use hover for current state. An example decision tree is attached with the appropriate response, benevolently allude the equivalent.

4 0
3 years ago
Which type of classroom enable students to attend lectures without being physically present with the teacher
wlad13 [49]
Online classroom..................
8 0
3 years ago
Read 2 more answers
What is a benefit of using a combination of symmetrical and asymmetrical cryptography when transferring data across the internet
Luden [163]

Answer:

Explanation:

Asymmetric cryptography, is a cryptographic system that uses two different types of keys both public and private keys. Symmetric cryptography on the other hand uses the same type of key for both encryption. The benefit of using a combination when transferring data across the internet is that Asymmetrical cryptography is necessary to establish a secure connection while symmetrical cryptography can enhance the speed of the data transmission after connection has been established, thus both provide a unique benefit.

7 0
4 years ago
Usted repetir la pregunta?<br>O A. Es<br>B. Puede<br>C. Puedes<br>O D. Está​
puteri [66]

Answer:

I believe the answer is B. Puede

5 0
3 years ago
Read 2 more answers
Assume that the message M has to be transmitted. Given the generator function G for the CRC scheme, calculate CRC. What will be
ANEK [815]

Let the message be M : 1001 0001   and the generator function is G : 1001

Solution :

CRC sender

            <u>                                     </u>

1001     | 1001  0001  000

           <u>  1001                             </u>

           <u> 0000  0001             </u>

                        1000

            <u>            1001             </u>

                        0001  000

                             <u>    1 001  </u>

                                 0001

Here the generator is 4 bit - 1, so we have to take three 0's which will be replaced by reminder before sending to received--

eg    1001  0001  001    

Now CRC receiver

                <u>                                     </u>

1001         | 1001    0001   001

                <u> 1001                           </u>

                 0000 0001

                       <u>     1001                  </u>

                            1000

                          <u>  1001              </u>

                            0001  001

                    <u>        0001  001      </u>

                                   0000

No error

7 0
3 years ago
Other questions:
  • Select the correct answer,
    14·1 answer
  • What is the best definition of the 7x7 rule for maximizing audience comprehension
    13·1 answer
  • Five differences between monitor and printer
    15·1 answer
  • What are some effective methods for scrolling? Check all that apply.
    6·1 answer
  • Which type of program would allow Adriana to see what she is creating rather than just a code
    14·2 answers
  • WHICH COMPUTER COMPONENT CONTAINS ALL THE CIRCUITRY NECESSARY FOR THE OTHER COMPONENTS OR DEVICES TO COMMUNICATE WITH ONE ANOTHE
    12·1 answer
  • Advantages of desktop publishing over traditional methods include       
    11·1 answer
  • Help me with this please​
    8·1 answer
  • 1.
    9·1 answer
  • In what ways can information be slanted in a news report? List at least five ways.
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!