1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MA_775_DIABLO [31]
3 years ago
11

Power point programm​

Computers and Technology
1 answer:
viva [34]3 years ago
6 0
Huhhhhhhhyyyyhheyeydud
You might be interested in
Sypherpk is good go sub 2 him
attashe74 [19]

Answer:

Ok

Explanation:

I will check him out, do you need anything else though?

4 0
3 years ago
Read 2 more answers
Assignment 4: Evens and Odds
Anika [276]

n = int(input("How many numbers do you need to check? "))

odd = 0

even = 0

i = 0

while i < n:

   num = int(input("Enter number: "))

   if num % 2 == 0:

       even += 1

       print(str(num)+" is an even number")

   else:

       odd += 1

       print(str(num)+" is an odd number")

   i += 1

print("You entered "+str(even)+" even number(s).")

print("You entered "+str(odd)+" odd number(s).")

I hope this helps!

5 0
3 years ago
Can some please help me learn how to make a program via Binary Code?
padilas [110]
Look up binary code dictionary it will help you learn codes in letter of binary
8 0
4 years ago
What is the advantage of using CSS?
Naily [24]

Answer:

c) It creates a better-structured document

Explanation:

The layout of a web page is better controlled. Style (CSS) kept separate from structure (HTML), means smaller file size. Reduced file size means reduced bandwidth, which means faster loading time.

3 0
3 years ago
Read 2 more answers
If i'm wanting to use hydra on linux to crack a password and the issue regarding hashes occurs, what shall i do?
Inessa05 [86]
Give up do research and then try again
7 0
4 years ago
Other questions:
  • These are the characteristics of good blogs.
    11·1 answer
  • Which of the following are recommended techniques for protecting computer files and data? Check all of the boxes that apply.
    15·2 answers
  • Which of the following describes a potentially damaging computer program that affects, or infects, a computer negatively by alte
    9·2 answers
  • The Internet was first used by which of the following institutions?
    7·1 answer
  • OkkKkkkkkEYEYYEYEYEY BYEYYEYEYEyeeyeyyeEYEy if you know you know
    11·1 answer
  • Why is storage and important part of the computing process? It must be atleast five sentences.
    11·1 answer
  • Re:
    15·1 answer
  • My chrome book computer clock is an hour off how do I fix that
    14·1 answer
  • How is hybrid computer used in hospitals? please reply fast!!​
    14·1 answer
  • 8.10.8 guess the passcode codehs
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!