1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ratling [72]
3 years ago
10

HEEEEELPPP!!!BRAINLIEST!!! THIS IS URGENT!!!

Computers and Technology
1 answer:
Fittoniya [83]3 years ago
4 0

Answer:

Begin the statement with the proper keyword to start the loop

Explanation:

Given

The code segment

Required

Fix the code

The first line of the code segment is meant to be a for loop, but it does follow the right syntax.

This is so because the for keyword is missing.

The first line should be corrected and replaced with:

for count in range(80):

Hence, option (b) is correct

You might be interested in
The core of ___________ is the implementation of intrusion detection systems and intrusion prevention systems at entry points to
cestrela7 [59]

Answer:

sorry I can't understand what is this is

3 0
3 years ago
What is data called that is input into a cryptographic algorithm for the purpose of producing encrypted data?
labwork [276]
<span>A key is data called that is input into a cryptographic algorithm for the purpose of producing encrypted data. There are two types of cryptography, the public key and the private key. The public key uses public keys to encrypt data and private key uses private key to decrypt data. They are produced by a group of algorithms. </span>
8 0
4 years ago
What does it mean when it says this person is unavailable on messenger.
arsen [322]

Answer:

The user has a deactivated account 

Explanation:

or the user does not have the account anymore good luck and I hope you do well <3

4 0
2 years ago
As you move through your professional career, you will receive requests for favors and contributions. You will not be able to ho
Alika [10]

Growing professionally comes with advises, comments (solicited and unsolicited), request for favours and also contributions. Moving up your professional career from the days of little beginning have always been accompanied with all of the requests and comments. As one levitates successfully, requests and contributions tend to increase. This can be scary and at the same time tiring as you go to question the sensibility of some of your decisions. While being inundated with these ’assistance', it is important that you carefully and thoroughly select the comments, contributions, requests of favours etc that is worth responding to. While some would be considered others will be discarded. Now, the question is how best can we politely turndown a person's request of favours and contributions without sounding rude, ungratetul and condescending. Both useful and irrelevant contributions deserve good responses. We could start by appreciating the request for favours and contributions, and tell whomsoever it may concern that you appreciate his/her assistance but unfortunately would not be needing them.

8 0
4 years ago
Question 19 :A user needs the video capability in his computer upgraded to support a new graphics application. The computer incl
elena-s [515]

Answer:

The onboard video card should be disabled in the BIOS. After you disable the onboard video card in the BIOS, it will no longer function.

Explanation:

Since in the question a user wants to upgrade for new graphics application and also the computer involves the onboard video card and a new video card is installed in the computer now you want to disabled it

So this can be done in the BIOS i.e basic input output system which is to be used for rebooting the computer system

And after disabled it, you cannot used.

3 0
3 years ago
Other questions:
  • What is heat sink?what is its use?If it is not in the system what will happen?
    12·1 answer
  • How would a designer interpret the word denier?
    12·2 answers
  • To provide both encryption and integrity protection, wpa2 uses aes encryption with:
    12·1 answer
  • MICR is an input or output devices
    5·1 answer
  • How do i recover a google account that was deleted?
    7·1 answer
  • 1. How do you know that A Drop of Water is an expository<br> text? GENRE
    7·1 answer
  • Factoring is the revers of​
    14·1 answer
  • The function changeLocation is also called a _____.
    5·2 answers
  • Please helpppppppppp​
    8·1 answer
  • IT professionals ensure servers connected to the network operate properly. (2 points) True False
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!