1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Scorpion4ik [409]
3 years ago
14

Alexi is writing a program which prompts users to enter their race times without decimals. Which function should she use? (5 poi

nts)
float()
int()
print()
spring()
PLZZ HELP THIS IS A BIG PART OF MY GRADE!
Computers and Technology
1 answer:
fgiga [73]3 years ago
4 0

Answer:

int()

Explanation:

bc int removes decimal

You might be interested in
Edible vaccines, a more controversial approach to vaccine development, have been investigated by scientists. Plants can be genet
madreJ [45]
I need some more information. If you need any more help with this please leave a relpy.
8 0
4 years ago
This site isn't letting me add my ans and wut should I do?
kodGreya [7K]
You can probably refresh or log out or something.
4 0
3 years ago
Custodial workers that access the terminal area must have a fingerprint background check done and training unless they are escor
tensa zangetsu [6.8K]

Answer:

True they do. mark brainliest.!!!!! please

Explanation:

6 0
2 years ago
How to connect a three way switch to a regilar switch?
victus00 [196]
The correction is *regular.
4 0
3 years ago
The use of IDPS sensors and analysis systems can be quite complex. One very common approach is to use an open source software pr
lawyer [7]

Answer:

IDP sensors can be complicated.An open-source software program called snort program.

Explanation:

Snort is an open-source network intrusion detection system (IDS) and prevention system. It is created in 1998 by Martin. Snort's open source network-based can perform analysis and packet logging on an Internet Protocol network.

The snort program can be used to detect probes or attacks. Snort configured three modes

sniffer

pocket logger

network intrusion detection.

6 0
3 years ago
Read 2 more answers
Other questions:
  • ll of the following are extra precautions you can take to secure a wireless network EXCEPT ________. Select one: A. turn on secu
    9·1 answer
  • What is the purpose of lookup tables in spreadsheet software
    13·2 answers
  • What can web designers use to control the individual web page layouts for all of the pages on a website?
    7·1 answer
  • 1. What is the main factor that affects Earth’s average temperature?
    12·1 answer
  • The 2 main types of copyright relevant to the recording industry?
    5·2 answers
  • Can a spreadsheet be filtered only by one column at a time?
    11·1 answer
  • Declare a char array named line of size 50, and write a statement that reads in the next line of console input into this array.
    6·1 answer
  • Www.microsoft.com is an example of this (two words) (last letter is e) and has to be (10 letters)
    10·1 answer
  • 4. In paragraph 7, what is the meaning of the phrase "not
    13·1 answer
  • What is the difference between a status bar, title bar, and tabs?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!