1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OleMash [197]
3 years ago
9

Kamusta Bagong user Ako dito ​

Computers and Technology
1 answer:
devlian [24]3 years ago
5 0

Answer:

kamusta Bagong user Ako dito = hello New user I'm here

You might be interested in
Ayuda pliz es para ya!!!!!<br> nesesito un codigo html que me muestre este texto
BartSMP [9]
Sorry I don’t understand your language I wish I could help you but I just don’t understand

3 0
3 years ago
What does ADF Means?<br><br> What does CLO Means?
Elenna [48]
ADF means 'automatic document feeder'

CLO means 'collateralized loan obligation'
3 0
4 years ago
Which of the following statements is/are correct? a. At the network layer, entitlement can map identity and/or attributes to fun
AlekseyPX

Answer:

Option D

Explanation:

An Entitlement is an option to utilize, get to or devour an application or asset, commonly for a charge. For instance, a client may buy an Entitlement to utilize an application in ceaselessness (a "unending" permit), or they may buy a period restricted option to utilize an application, (for example, a one-year membership permit).

7 0
3 years ago
Discuss the major procedures that investigators must use in order to collect network trace evidence of computer-related crimes.
frez [133]

Answer:

The answer is below

Explanation:

The major procedures that investigators must use to collect network trace evidence of computer-related crimes include the following:

1. Establish appropriate guidelines to follow: before starting the actual investigation, all the legal procedures and instructions to follow must be clearly stated and shown to everybody involved in the investigation process.

2. Assess the Evidence: the investigators must assess all the available evidence by checking the computer through a specific means. The assessment includes checking of hard drives, email accounts, social networking sites, or similar digital prints that can be used as proof of the criminal activities

3. Acquire the Evidence: here the investigators must find an appropriate means of gathering the evidence formally and legally. This may involve the removal of any form of hardware such as hard drives, and software-related items that can be extracted.

4. Examine the Evidence: this involved examination of the acquired evidence, to determine if it can be used as proof or not. This involved analyzing the evidence to check if they correlate with the criminal activities under investigation. Some of the things to check include, date of formation of the evidence, the names attached to it, the routes those data were sent or received from, etc.

5. Prepare a report and document them appropriately: this involved the proper detailing and recording of the information derived from the evidence. It includes the time of evidence examination and methods used in examining them. Also, the means at which they acquired the evidence among others.

8 0
3 years ago
Write a function so that the main program below can be replaced by the simpler code that calls function mph_and_minutes_to_miles
Blababa [14]

Answer:

Here is  code in python .

#function to calculate miles traveled

# pass two parameter in the function "miles_per_hour" and "minutes_traveled"

def mph_and_minutes_to_miles(miles_per_hour, minutes_traveled):

# convert minutes to hours

   hours_traveled = minutes_traveled / 60.0

   #calculate total miles traveled

   miles_traveled = hours_traveled * miles_per_hour

   #return the value

   return miles_traveled

#read input from user

miles_per_hour = float(input())

minutes_traveled = float(input())

#call the function and print the output

print('Miles: %f' % mph_and_minutes_to_miles(miles_per_hour, minutes_traveled))

Explanation:

Read the value of "miles_per_hour" and "minutes_traveled" from user. call the function mph_and_minutes_to_miles() with those two parameters.calculate total hours from the minutes_traveled by dividing it with 60. then calculate the total miles by multiply hours_traveled * miles_per_hour. then return the miles travelled.

Output:

20                                                                                                                        

150                                                                                                                        

Miles: 50.000000

4 0
3 years ago
Other questions:
  • Lindsay owns a candy store that typically makes all if its sales to tourists visiting a nearby zoo. Why might she decide to set
    14·2 answers
  • In most presentation software, custom animations are added from the _____. Insert menu Normal view Slide pane Task pane
    12·2 answers
  • What is a nonlinear presentation?
    14·2 answers
  • CRM software programs are designed to help companies gather all customer contact information into multiple data management progr
    13·1 answer
  • Excel can display characters in only three font colors: black, red, and blue. (points : 2) true false
    11·1 answer
  • Can anybody tell me why when I use my camera to scan the question is not working?
    8·1 answer
  • If not cleared out, log files can eventually consume a large amount of data, sometimes filling a drive to its capacity. If the l
    10·2 answers
  • ILL GIVE BRAINLIEST HELLP.
    10·1 answer
  • I'll give brainlyist
    9·2 answers
  • Please answer questions in complete sentences!
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!