1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jok3333 [9.3K]
3 years ago
15

Python 3.8.2 detais

Computers and Technology
1 answer:
olga2289 [7]3 years ago
5 0

Answer:

me dont know

Explanation:

You might be interested in
1. (15%) Consider a computer system with three users: Alice, Bob, and Cyndy. Alice owns the file a, and Bob and Cyndy can read i
Fantom [35]

Answer:

answered in Image and explanation is given below.

Explanation:

CL is euqal to user permission on every file

ACL is equal to how permissions are defined for one life for example File a, read, write, execute.

4 0
3 years ago
You can insert a text box from the Insert tab or through the ______ tab in the Microsoft Publisher application.
jeka57 [31]
If i had to guess it would be 1. page design but i could be wrong i dont use publisher to much.
4 0
3 years ago
Write a function called quadruple that quadruples a number and returns the result. Then make several calls to the quadruple func
valentina_108 [34]

def quadruple(n):

   return n*4

print(quadruple(3))

print(quadruple(1))

print(quadruple(2))

I wrote my code in python 3.8. I hope this helps.

7 0
3 years ago
The layout gallery displays 10 slide layouts with a variety of placeholders to define text and content positioning and formattin
Papessa [141]
The above statement is FALSE.

The layout gallery displays 9 slide layouts NOT 10. 

These 9 layouts have various<span> placeholders to define text and content positioning and formatting.

</span>1 - Title slide
2 - Title and content
3 - Section Header
4 - Two content
5 - Comparison
6 - Title only
7 - Blank 
8 - Content with Caption
9 - Picture with Caption
8 0
3 years ago
What is BPM in rythm games?
alina1380 [7]

Answer:

BPM: Beats Per Minute.

Explanation:

4 0
3 years ago
Other questions:
  • Derek, a project manager, needs to create a plan for a software development project. Which approach or document will help him de
    15·1 answer
  • The malicious use of computer code to modify the normal operations of a computer or network is called a ___ .
    13·1 answer
  • How long before a speech should you begin practicing?
    10·2 answers
  • Syah work as senior designer in creative design company. he is an imaginative person and always updates himself with the latest
    15·1 answer
  • What two items must be given to the socket function in order to create a socket object? A) The socket type that will be used. B)
    10·1 answer
  • Which of the following represents the biggest difference between asymmetric and symmetric cryptography?
    9·1 answer
  • 3.6 code practice (edhesive)
    8·1 answer
  • Which of the following are good ways to keep your information and your computer secure?
    10·2 answers
  • The physical parts of a computer are called application software.
    9·2 answers
  • How do you think the blitz might have affected civilian morale in london
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!