1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Phantasy [73]
2 years ago
12

E-What is the important of Recycle bin?Ans:​

Computers and Technology
1 answer:
stepan [7]2 years ago
5 0
The recycle bin is used in Windows computers to store deleted items such as files and folders. They are temporarily stored before they are permanently deleted.
You might be interested in
network consisting of computers and other devices that are eithrr fully or partially connected to each other
tekilochka [14]

The answer is a Mesh topology. This method connects every device to each other device in the network. A wired full-mesh topology is not as common as it is impractical and highly expensive. A partial mesh topology offers redundancy if one of the connections goes down and usually uses a connecting medium such as a router to eliminate cables and expensive PCI NIC's.

8 0
3 years ago
Question 12
AlladinOne [14]

Which is a multicast address ?

ans: 241.2.2.1

6 0
2 years ago
Package Newton’s method for approximating square roots (Case Study 3.6) in a function named newton. This function expects the in
notka56 [123]

Answer:

import math

#Initialize tolerance

tolerance = 0.000001

def newton(x):

   """ Returns the square root of x """

   #Performs the successive approximations

   estimate = 1.0

   while True:

       estimate = (estimate + x / estimate) / 2

       difference = abs(x - estimate ** 2)

       if difference <= tolerance:     # Break out of loop if difference is less than tolerance

           break            

       return estimate     # While the difference value is > TOLERANCE, the process continues

def main():

   """Allows the user to obtain square roots."""

   while True:

       #Receive the input number from the user

       x = input("Enter a positive number or enter/return to quit: ")

       if x == "":     #if user presses "Enter" then exit the program

           break       # Otherwise, continue the process of allowing new numbers

       x = float(x)

       #Output the result

       print("The programs estimate of the square root of ", x, "is ", round(newton(x),2))

       print("Python's estimate: ", math.sqrt(x))

main()

8 0
3 years ago
4.22 lab*: program: automobile service invoice(1) output a menu of automotive services and the corresponding cost of each servic
azamat

To write the code for this exercise, we must be familiar with Python's computational language.

The attachment contains the code.

As a result, the Python code can be written as follows:

0 service1 cost

0 service2 cost

print("Services at Davey's Auto Shop")

print("Oil change: $35; Tire rotation: $19; Car wash: $7; Car wax: $12;"

input = service1 ("Select first service: ")

product2 = input ("Select second service: ")

If "Oil change" is service 1, then

35 service1 cost

Tire rotation: elif service1 == true

cost1 service1 = 19

"Car wash," if service1 is true:

cost service1 = 7

"Car wax" if service1 is true:

cost service1 = 12

if (service1) == "-":

service 1 equals "No service"

0 service1 cost

When service2 equals "Oil change,"

35 service2 cost

Tire rotation: elif service2 == true

cost2 service2 = 19

"Car wash" if service2 is true:

cost2 service2 = 7

"Car wax" if service2 is true:

cost2 service2 = 12

To know more about python click on the link:

brainly.com/question/18502436

#SPJ4

8 0
11 months ago
Which best describes a VPN?
aleksandr82 [10.1K]

A private connection through a private network

8 0
3 years ago
Read 2 more answers
Other questions:
  • People with healthy media diets:
    12·1 answer
  • How can you have a safe browser experience
    9·1 answer
  • An access control system that grants users only those rights necessary for them to perform their work is operating on which secu
    6·1 answer
  • You are planning trip to South America and and are worried about your devices with private keys being stolen. So you decide to s
    9·1 answer
  • Select a cybersecurity career that interests you. Describe the job duties and identify the skills required to excel in that care
    15·1 answer
  • What is true about the dilation?
    6·2 answers
  • What are 6 subtopics on computer programming ?
    13·1 answer
  • Consider the following static method.
    9·1 answer
  • What is a program that includes a function parameter capable of doing?
    8·1 answer
  • You are reviewing a friend’s HTML project. You notice that the only metadata is the title. Furthermore, you ask your friend abou
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!