1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zubka84 [21]
3 years ago
14

PLZ ANSWER ALL MY QUESTION. Which line of code will display the variable num rounded to the nearest tenth?

Computers and Technology
1 answer:
zavuch27 [327]3 years ago
5 0

Answer:

A

Explanation:

You might be interested in
Alice and Bob decide to communicate using NTRUEncrypt with parameters (N, p, q) = (7, 3, 29). Alice’s public key is h(x) = 3 + 1
Andrei [34K]

Answer:

Security Innovation NTRU cryptographic software invention and reference source code for NTRUEncrypt are released to public domain under CCO 1.0 license.

Invention U.S. Patent No. U.S. Issue Date U.S. Application No. U.S. Filing Date Countries

Public key cryptosystem method and apparatus 6,081,597 Jun 27, 2000 08/914,449 Aug 19, 1997 US, Japan, Canada, Australia, Israel, China, Europe

Ring-based public key cryptosystem method 6,298,137 Oct 2, 2001 09/543,708 Apr 5, 2000 US, Europe, Canada

Speed enhanced cryptographic method and apparatus 7,031,468 Apr 18, 2006 09/939,531 Aug 24, 2001 US, Europe, Canada

Explanation:

4 0
3 years ago
blank affect your vision because your eye muscles are tired along with the rest of your body and is difficult to focus
marta [7]
<span>stress affect your vision because your eye muscles are tired along with the rest of your body and is difficult to focus .
When experiencing stress, Brain will most commonly send a signal to our body to rest and refresh it functions. This often causes our eyes to felt really heavy and affecting our vision.</span>
7 0
3 years ago
Read 2 more answers
Fern has set up a computer network for the entire building. Unfortunately, the signal strength diminishes as it reaches toward t
goldfiish [28.3K]

Answer:

signal repeaters.

Explanation:

The best device to use in this scenario would be signal repeaters. These basically grab an already existing signal and repeats it in a specific direction therefore amplifying the range. These devices are usually used when a large network system is not reaching certain devices that are located too far away. These devices are then placed in midpoints between the network and the device and aimed towards the direction of the device. It then picks up the existing signal and retransmits it to the devices' location so that the device can pick up the network signal and access it.

6 0
3 years ago
Briefly explain specialisation?​
Jlenok [28]

Answer:

b

Explanation:

4 0
3 years ago
The Save command saves your changes silently without additional prompts, using the same save settings; the Save As command reope
kirza4 [7]

The "Save command" saves your changes <u>silently</u> without additional prompts and it uses the same save settings while the "Save As command" <u>reopens</u> the Save screen: True.

What is the Save command?

A Save command can be defined as a type of command associated with the file menu of a software application and it causes a copy of the current file to be created and stored to a specific location on a computer system.

<h3>What is the Save as command?</h3>

A Save command can be defined as a type of command associated with the file menu of a software application and it causes a copy of the current file to be created and stored to a different location, file name, and/or file type.

In conclusion, the "Save command" saves your changes <u>silently</u> without additional prompts and it uses the same save settings while the "Save As command" <u>reopens</u> the Save screen, so as to enable you make different choices.

Read more on Save command here: brainly.com/question/16852455

5 0
3 years ago
Other questions:
  • Name size of machine screw that is used to secure switches and receptacles to device boxes
    13·1 answer
  • What runs a network, steering information between computers and managing security and users?
    11·1 answer
  • The __________ vulnerability assessment is a process designed to find and document selected vulnerabilities that are likely to b
    15·1 answer
  • In this part, you have to implement a linked list that maintains a list of integers in sorted order. Thus, if the list contains
    13·1 answer
  • So can u please follow my new ig acc i just started it yesterday its called stunnerspamz
    5·2 answers
  • Ben pays his mobile bills, watches movies, and shops online using the Internet. Which internet activity does he perform?
    13·2 answers
  • Hypercompetition implies that any architecture must be designed with maximum flexibility and _____ to ensure it can handle the i
    6·1 answer
  • PLEASE HURRY!!!!
    8·2 answers
  • What is the core function of an enterprise platform
    12·2 answers
  • What are the components of computer system??<br>​
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!