1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ella [17]
3 years ago
13

Help please what is the answer , thanks!!!

Computers and Technology
1 answer:
shepuryov [24]3 years ago
4 0

Answer:

X = "Hello World"

Y = "hello world"

Z = 100

C = 200

if X == Y:

   print("TRUE")

else:

   print("FALSE")

if Z > C:

   print("TRUE")

else:

   print("FALSE")

You might be interested in
What steps can you take to secure your private information?.
pogonyaev

Answer:

Below:

Explanation:

1. Practice mail security. Use a public mailbox rather than your home mailbox to send bill payments and other mail containing sensitive information. Pick your mail up promptly and ask the post office to hold it while you’re away.

2. Guard your Social Security number. Don’t carry your Social Security card, military ID, Medicare, or other cards that have your Social Security number on them unless you are going somewhere where you will need them. Only provide your Social Security number when there is a legitimate need to do so.

3. Lock and shred. Keep your billing and banking statements and other personal records locked up and shred them when no longer needed.

4. Stop prescreened credit and insurance mailings. Call toll-free 1-888-567-8688 to get off mailing lists for credit and insurance offers. Your Social Security number will be required. This keeps thieves from intercepting and accepting the offers in your name and doesn’t affect your eligibility for credit or insurance.

5. Keep private information to yourself. Never respond to phone calls or emails asking to confirm your Social Security number or account numbers. Don’t leave PIN numbers, passwords or other personal information around for others to see.

6. Be safe online. Use anti-virus and anti-spyware software and a firewall on your computer and keep them updated. When you provide financial or other sensitive information online, the address should change from “http” to “https” or “shttp.” A symbol such as a lock that closes may also indicate that the transmission is secure.

7. Look at your bills and bank statements promptly. If you find any charges or debits that you never made, contact the bank or company immediately.

Hope it helps.......

It's Muska...  

6 0
3 years ago
Observe the following statements and decide whether the variable result’s value is TRUE or FALSE.
devlian [24]

Answer:

    result 1 = false;

     result 2 = true;      

Explanation:

result 1 = (43 < -77 && 1! = 10)

            43 < -77 = false

             1 != 10 = true

for any false && true logical operator, it returns false

    result 1 = false;

 false = 90 < -77 || -1 < 43

              90 < -77 = false

                -1 < 43 = true

for any false || true logical operator, it returns true

  result 2 = true;      

5 0
3 years ago
_________ analysis is a data mining application that discovers co-occurrence relationships among activities performed by specifi
SSSSS [86.1K]

<u>Affinity analysis </u>is a data mining application that discovers co-occurrence relationships among activities performed by specific individuals or groups, such as market basket analysis.

<h3>What is affinity analysis?</h3>

Affinity Analysis is a type of predictive analysis method that uses data mining to uncover hidden, insightful correlations between various variables based on how frequently they occur between distinct persons or groups in the dataset.

The Product Affinities Analysis sheds light on the items that clients buy in tandem during a shopping trip, such as how they are filling out a broader weekly shopping trip or putting together specific meals.

Therefore, Affinity analysis is a data mining tool that identifies co-occurrence patterns between tasks carried out by particular people or groups, like market basket analysis.

To learn more about affinity analysis, refer to the link:

brainly.com/question/13077215

#SPJ5

5 0
1 year ago
Read 2 more answers
What is the first step necessary to begin setting up a website once a host has been selected and paid?
NemiM [27]

Answer: Select a domain name

4 0
3 years ago
Janeal spends her day looking at the stock and bond markets and evaluating how the portfolios of the businesses she serves will
pychu [463]

Answer:

ur answer good sir will be : financial analyst

and a brainliest will be good to thnx

4 0
4 years ago
Other questions:
  • (PLS HELP 99 POINTS) In a paragraph of no less than 125 words, explain the three aspects involved in gaining a true appreciation
    14·2 answers
  • How can our perceptions help us to choose the channel for our message?
    5·1 answer
  • describe how t - charts and star charts can be used to organize information into cause and effect relationships
    12·2 answers
  • write a java program to accept three item names and prices, and output them. Also output the average price if one of the items i
    14·1 answer
  • Someone pls help me with this question (Java)
    5·2 answers
  • Which SCSI standard allows for the technique known as “hot swapping”? Ultra SCSI Original SCSI Serial SCSI Fast-Wide SCSI
    5·1 answer
  • PLZ HELP HELP HELP ME I NEED ANSWER MATH​
    13·2 answers
  • Which approach to bandwidth usage consumes all of the available frequencies on a medium to transmit data
    7·1 answer
  • The different languages that follow specific RULES. These languages use commands
    9·1 answer
  • A social service agency hires accenture to improve training and experiences for caseworkers. What is one way accenture can use v
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!