1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Karo-lina-s [1.5K]
3 years ago
13

Question 1 of 30

Computers and Technology
1 answer:
Paha777 [63]3 years ago
7 0
It’s exercise tax $5 tax on a cable television line

hope this helped

~ mo
You might be interested in
Exodia<br>Principle of Computer Operation​
tamaranim1 [39]

Answer:

????

Explanation:

6 0
3 years ago
Which of these number systems uses the most unique characters?
makvit [3.9K]

Answer:

i say hexadecimals

Explanation:

The hexadecimal numeral system, often shortened to "hex", is a numeral system made up of 16 symbols (base 16). The standard numeral system is called decimal (base 10) and uses ten symbols: 0,1,2,3,4,5,6,7,8,9. Hexadecimal uses the decimal numbers and six extra symbols.

4 0
3 years ago
As we think of computer crime, there are ways in which thieves can steal your banking information through ATM machines. If you w
Travka [436]

Answer:NO, I WILL NOT GIVE THE TELEPHONE NUMBER

WHY?

IT IS A BREACH OF TRUST

IT IS A BREACH OF DATA PRIVACY

IT ALSO VIOLATES THE PRIVACY OF INFORMATION RIGHT OF THE GIRL.

Explanation:BREACH OF TRUST is act or actions taken against the signed agreement between a person and another party which may be any Organisation like a Financial Institution where the Financial Institution agrees not to release the personal Information about their customer without the person's consent.

IT IS A BREACH OF DATA PRIVACY many persons wants their data which are made available to Organisation to be kept private,divulging such information without the person's consent is a reach of data privacy.

It violates the privacy of Information right of the Girl, except for Security or other specified reasons no Organisations or person is given the right to divulge another person's right to a third party, ALL THESE VIOLATIONS ARE PUNISHABLE UNDER THE LAWS OF THE LAND.

4 0
3 years ago
4.2 lesson practice edhesive
Delvig [45]

Answer:

Following are the code to this question:

m=3#defining a variable m  

while(m<22):#defining a while loop to count value  

 print(m)#print value

 m=m+3#increment the value by 3

Output:

Please find the attached file.

Explanation:

Note: In the given question, it is not clear that what the question asks about so, we describe the code above and its description can be defined as follows.

In the above code, an integer variable m is defined, that holds an integer value, in the next step, it uses a while loop to increment the value by 3 and use the print method to print its calculated value.

8 0
3 years ago
JAVA
ryzh [129]

import java.util.Scanner;

public class JavaApplication33 {

   public static void main(String args[]) {

     Scanner scan = new Scanner(System.in);

     int total = 0;

     System.out.println("Enter positive numbers (-1 to stop)");

     while (true){

         

         int num = scan.nextInt();

         if (num == -1){

             break;

         }

         else{

             total += num;

         }

     }

     System.out.println("Sum is "+total);

     

}

}

I hope this helps!

7 0
2 years ago
Other questions:
  • Without exception, you must always stop when ______________.
    14·1 answer
  • Greg works for online games development company. He occasionally visits online literature sites and downloads e-books of his cho
    12·2 answers
  • Macy reviewed Steve's presentation. Images in the slides were distracting from the presentation. What advice should
    7·2 answers
  • With ____________________, you can insert and remove a device while the computer is running.
    11·1 answer
  • A healthcare organization received notification that a hospital employee’s laptop that contained PHI was inadvertently left at a
    14·1 answer
  • If i don't update my computer what threat does my computer face?
    6·1 answer
  • What does the Python print() function do?
    7·1 answer
  • Word Bank:
    13·1 answer
  • A company is completing research and development for software which it is planning to produce in approximately 2 years time. Whi
    7·1 answer
  • Why does the media play such an important role in our personal freedom? Select 3 options.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!