1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
levacccp [35]
3 years ago
13

Program 3.Study the code carefully and write out the line where there is error, debug it and write out the correct code

Computers and Technology
1 answer:
stich3 [128]3 years ago
5 0

Answer:

Several errors:

  • 0 where ( ) was intended (probably OCR problem)
  • space between As and Double
  • Single quote in stead of double quote in text string
  • $ in stead of & near Math.sqrt
  • missing spaces around "is" for proper formatting

You might be interested in
9 dmz, vpn, vlan where in the network do you place a dmx, why, what attacks are prevented? what does a vpn do, provide an exampl
creativ13 [48]

At the: Firewall, the DMZ is configured in the Organization. Within the firewalls, it is accessible. They have been completed with the intention of adding an additional layer of safety to the organization to protect it.

The DMZ safeguards not only the web server but also the remainder of the network. To allow visitors to the network to access the web server, a security breach must be made.

The DMZ lessens the possible risk caused by this gap. A secure network, protected by the FortiGate, that only permits access if it has been specifically authorized is known as a DMZ network (from the term "demilitarized zone").

In this illustration, a private subnet is used by the DMZ network, which permits access to a web server by internal and external users using distinct addresses while blocking access from the web server to the internal network in the case that the web server is compromised.

To know more about DMZ click on the link:

brainly.com/question/2920815

#SPJ4

7 0
1 year ago
What is Colby Knox known for?
fiasKO [112]

Answer:The School in the Woods. Colby Knox is known for his work on The School in the Woods

Explanation:

7 0
3 years ago
Read 2 more answers
Which type of communication protocol converts data into standard formats that can be used by applications?
larisa86 [58]
<span>Arrival protocols are the type of data protocols that convert data into standard formats that can be used by applications, such as email, Web browsers and Skype</span>
8 0
3 years ago
What is the missing line of code? &gt;&gt;&gt;from math th import &gt;&gt;&gt; Point = [1,5) &gt;&gt;&gt; bPoint [4.9]​
Ulleksa [173]

Answer:

I believe import math.

Do let me know if its correct.

3 0
2 years ago
You are going to visit a national park, and have never been there before. You are using a map to try and make the distance trave
Firdavs [7]

Answer:

eggs fishing didn't ysjffj

8 0
3 years ago
Other questions:
  • Tools, documents, language and processes—these are examples of boundary objects. Which of the following is the best definition o
    11·1 answer
  • Enter a word: Good<br> Enter a word: morning<br> Good morning
    8·2 answers
  • Exampels of semantic tags ?​
    7·1 answer
  • Which company was the first to develop personal computers?
    6·1 answer
  • Based on the screenshot below which letter do you select to sort the items in an alphabetical order?
    9·1 answer
  • ................. are used to summarize data (option) (a) report (b) action ​
    12·2 answers
  • Second Largest, Second Smallest Write a program second.cpp that takes in a sequence of integers, and prints the second largest n
    15·1 answer
  • Create a public class Dog that stores a single double age set by the constructor. (Reject negative ages using assert.) Dog shoul
    13·1 answer
  • Released in 1976, the Apple I was Apple Computer's first product.<br><br> O True<br> O False
    6·1 answer
  • You conduct an experiment to find the probability of a flipped coin landing on
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!