1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
murzikaleks [220]
3 years ago
12

You wrote a program to compare the portion of drivers who were on the phone. Which statements are true? Select 4 options.

Computers and Technology
1 answer:
Charra [1.4K]3 years ago
3 0

Answer:

1,2,3,5 (it's not the one that starts with your program)

Explanation:

Edge 2020

You might be interested in
In this exercise, use the following variables : i,lo, hi, and result. Assume that lo and hi each are associated with an int and
Assoli18 [71]

Answer:

result = 0

i = lo

while i <= hi:

       result = result + i

       i += 1

Explanation:

Initialize the <em>result</em> as 0 to hold the summation value.

Since we are asked not to change the value of <em>lo</em> and <em>hi</em>, our loop control variable is <em>i</em> and initially it starts from <em>lo.</em>

Since we are asked to add the number from <em>lo</em> to <em>hi, </em>while loop condition checks it.

While the condition satisfies (during each iteration), the value of <em>i</em> is added to the result and the value of <em>i</em> is incremented by one.

7 0
3 years ago
The purpose of a function that returns "void" is:_________. A) To satisfy compiler warnings B) To package a repeated task as a f
galben [10]

Answer:

B) To package a repeated task as a function even though the task does not yield a value

Explanation:

The purpose of a function that returns "void" is to package a repeated task as a function even though the task does not yield a value. Since the function does not return any value, it control returns to the caller.

5 0
3 years ago
What are three ways digital identity is created and kept up? (open answer)
Anna007 [38]

Answer:

Capture attributes as ID documents or biometric data

Explanation:

Examples of such attributes include biometrics, verified identification documents, and third-party verification procedures. To create a trusted digital ID, there are typically three steps: capturing verified attributes, verification of the documents, and digitization of the ID.

Great day :) toodles

6 0
2 years ago
What subnet mask can be used to segment the 172.16.0.0 network to allow for a minimum of 6 subnets while maximizing the number o
marishachu [46]

The subnet mask can be utilized to segment the 172.16.0.0 network to qualify for a minimum of 6 subnets while maximizing the numeral of broadcasters per subnet is 255.255.224.0

<h3>What do subnet masks mean?</h3>
  • A subnet mask is a 32-bit numeral formed by setting keeper bits to all 0s and developing network times to all 1s.
  • In this way, the subnet mask divides the IP speech into the network and host addresses.
  • A subnet mask is used to separate an IP address into two pieces. One element defines the host (computer), and the different part identifies the network to which it belongs.
  • To better comprehend how IP lessons and subnet masks work, look at an IP speech and see how it's managed.

To learn more about  subnet mask, refer to:

brainly.com/question/3234986

#SPJ4

5 0
2 years ago
What is often used to improve the quality of a broadcast?
Karo-lina-s [1.5K]
The answer is relay station.
 Relay station is often used to improve the quality of a broadcast. It is an amplifier for restoring the strength of a transmitted signal. An amplifier is an electronic equipment that increases strength  of signals passing through it. Relay station has been known as America's Friendliest travel center.

8 0
3 years ago
Read 2 more answers
Other questions:
  • What is an effective way to display calculations in a Word document
    7·2 answers
  • Motorcycles have two or three wheels, a seat for the rider and at least a ____ horse-powered engine.
    15·1 answer
  • What are two variables is figure 1 comparing
    10·1 answer
  • Write a line of code to convert time to hours. Remember there are 60 minutes in an hour. Then write a line of code to calculate
    9·2 answers
  • Create a public class Dog that stores a single double age set by the constructor. (Reject negative ages using assert.) Dog shoul
    13·1 answer
  • Which quality should an experiment have to be replicable and valid? O clearly detailed results O a well-cited research paper O s
    7·1 answer
  • MODERATOR DELETE MY ACC
    8·2 answers
  • To find detailed information about the origin of an email message, look at the ________________.
    11·1 answer
  • you want to be able to restrict values allowed in a cell and need to create a drop-down list of values from which users can choo
    14·1 answer
  • Each of the flowchart segments in Figure 3-24 is unstructured. Redraw each segment so that it does the same processes under the
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!