1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zvonat [6]
3 years ago
7

Which function converts the user's input to a number with a decimal?

Computers and Technology
1 answer:
levacccp [35]3 years ago
4 0

Answer:

Explanation: integer is the meaning of int() if you payed attention to programming class, int() would be a WHOLE number and not a decimal number, 2nd of all, a decimal number would be float() so the answer is int() hope i helped!

Explanation:

hope this helped good luck

You might be interested in
A systems administrator is designing a directory architecture to support Linux servers using Lightweight Directory Access Protoc
masya89 [10]

The options available are:

Search, modify.

StartTLS, delete.

Bind, modify.

Bind, add.

Answer:

StartTLS, delete

Explanation:

StartTLS is a computer networking term for email protocol command, in which a system administrator buses it to command an email server that an email client running in a web browser, wants to turn an existing insecure connection into a secure one. Thus, during this process, StartTLS permits a client to communicate securely using LDAPv3 over TLS.

On the other hand, the DELETE operation can make a change to a directory object.

6 0
3 years ago
Which original VPN protocol is supported by most platforms but offers low levels of security?
Masja [62]

Answer:

vpn

Explanation:

PPTP is the least secure. ...

L2TP/IPsec is a good VPN solution for non-critical use; however, this protocol, like PPTP, has been compromised as well. ...

Across many areas of the IT world, OpenVPN is easily the best all-around VPN solution.

7 0
2 years ago
4. In a relational database, entities are defined by
Inessa [10]

Answer:

C. attributes

Explanation:

A relational database is a database system that stores information within its servers. It has rows and columns that contain the data stored in them and which can be accessed at any time with the right administrative privileges.

In a relational database, entities are defined by their attributes. This is because an entity is the data that needs to be stored so, the attribute specifies that information and gives its value.

3 0
3 years ago
When a browser is open on your computer, what browser tool is used to move the webpage to the previously viewed page on the brow
ch4aika [34]

Answer:

back arrow button

Explanation:

7 0
3 years ago
You have recently completed IPAM installation and configuration. You have several each of DHCPservers, DNS servers, and domain c
Lina20 [59]

Answer:

The option(4) is the correct answer to the given question .

Explanation:

The main objective of the IPAM server is providing the Stand-alone deployment and incorporated the Orion Framework also the IPAM server manages the ipv4 and ipv6 domains of the servers .

If their is no DHCP servers are being seen in the inventory of IPAM server we have the uninstalling the DHCP server in the IPAM server because After uninstalling the files the removed and correct files are  restored in the IPAM server .

Others Options are incorrect because they are objective of IPAM server Others Options do not solved the problem of view Inventory .So option(4) is the correct way to solve the problem .

4 0
4 years ago
Other questions:
  • What possible reason would explain why you are unable to connect to the intranet site on your computer’s web server, using a bro
    13·1 answer
  • The Task Manager cannot be used to turn Services on and off.<br> True or False?
    8·2 answers
  • He primary purpose for attackers to send port scanning probes to hosts is to identify which ports are open. true false
    5·1 answer
  • Which term describes a process by which malicious code can enter from a non-secure network, and make a hairpin, or sharp turn, a
    6·1 answer
  • Thegroup of technologies concerned with the capturing, processing and transmissionof information in the digital electronic form
    9·1 answer
  • Given numRows and numColumns, print a list of all seats in a theater. Rows are numbered, columns lettered, as in 1A or 3E. Print
    7·1 answer
  • A common approach of networking multiple computers as opposed to a single computer is? called:
    14·1 answer
  • Judy forgot where she saved a certain file on her computer. Therefore, she searches for all files with a .jpg file extension. Wh
    7·2 answers
  • What is an overview of your opinion of Digital Etiquette? Do not look it up bc I will know!
    7·1 answer
  • In the computing environment the numerical value represented by the pre-fixes kilo-, mega-, giga-, and so on can vary depending
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!