1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sesenic [268]
3 years ago
8

Why is 0.3333333333333333 the output of print(1/6 + 1/6) in python?

Computers and Technology
1 answer:
Alisiya [41]3 years ago
5 0

Answer:

because 1/6 + 1/6 is 2/6 which is 1/3 and 1/3 is 0.333...

Explanation:

You might be interested in
The means by which you interact with any program on a computer is called the ____. Answer
Elodia [21]
User interface is the answer
4 0
3 years ago
What did research conducted in 2009 at Carnegie University Mellon predict?
riadik2000 [5.3K]

A.Information on social networking sites can give most or all digits of a person’s social security number.


5 0
3 years ago
In the output at the command line from a router that reads - ip ospf message-digest-key 1 md5 CISCO-123 - what does the CISCO-12
11111nata11111 [884]

Answer: a) it is used as a password.

Explanation:

In order to be able to exchange routing information , CISCO routers use an authentication process, so when they send a message (a HELLO message for instance) the router that receives the message confirms that the message is authentic.

There are several types of authentication in OSPF, null, plain  and MD5.

The difference between them is as follows:

1) null, implies that no password is included in the packet header, it's the default mode.

2) plain: In this type of authentication, the password is sent transparently from a router to his neighbor, as a plain text which makes it vulnerable to attacks from packet inspection software, like Sniffer.

3) MD5, is a more secure mode, in which the password is not sent directly, but a hash built based on the packet contents and the password itself instead.

MD5 (Message Digest 5) is the name of the algoritm used to build the hash that receiver will compare with the sent by the sender in order to confirm authentication.

The chosen password, is placed at the end of the command, after the type of authentication (MD5 in this case), which in this case is "CISCO-123".  

7 0
4 years ago
Which model states that the people and the environment for communication are constantly changing? A. linear B. interactive C. tr
In-s [12.5K]

The interactive model of communication states that the people and the environment for communication are constantly changing.

B. interactive

<u>Explanation:</u>

The world is a big place and you must have come across the infamous hearing, "Change is the only constant". Gradually, with the passage of time, the mindset of the people change over a certain topic for communication.

For instance, in old times, people did not prefer their children to have love marriages, in fact India has also seen honor killings to prevent love marriages. But now most portion of the society stands in favor of love marriages. People change, perspective change, and so does the perception and ideas.

6 0
3 years ago
_________________: informal messages that are passed on from person to person
sasho [114]

Answer:

Grapevine is the answer

4 0
3 years ago
Other questions:
  • Vaporization is the process in which liquid is sufficiently cooled to change states of matter from a liquid to a vapor true or f
    8·1 answer
  • A company that manufactures machine parts order a new system that makes Products at ten times the speed of earlier machines. the
    13·2 answers
  • Why was the personal computer an important invention?
    7·1 answer
  • Which of the following SQL statements will display all customers who have not recently placed an order? a. SELECT customer# FROM
    15·1 answer
  • Which software product release category is "generally feature complete and supposedly bug free, and ready for use by the communi
    7·1 answer
  • When might be the best time to start saving for retirement?
    11·2 answers
  • The ash and dust from a volcanic eruption can cause a ______ change in the environment.
    8·1 answer
  • When you're working with a word processing document and you press the DEL Key what happens
    7·2 answers
  • They are correct? thank you!
    6·2 answers
  • Why is the computer uses binary why not trinary?​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!