1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kitty [74]
3 years ago
7

What operating system do you use on your personal computer or mobile device

Computers and Technology
1 answer:
soldier1979 [14.2K]3 years ago
5 0

The most popular Operating Systems are:

Android

IOS

Windows

You might be interested in
In python 3.17 LAB: Convert to dollars
krok68 [10]

To convert the inputs to dollars and cents, we make use of a combination of multiplication and addition.

The program written in Python where comments are used to explain each line is as follows:

<em />

<em>#This gets input for the number of quarters</em>

quarters = int(input("Quarters: "))

<em>#This gets input for the number of dimes</em>

dimes = int(input("Dimes: "))

<em>#This gets input for the number of nickels</em>

nickels= int(input("Nickels: "))

<em>#This gets input for the number of pennies</em>

pennies= int(input("Pennies: "))

<em>#This converts the amount to dollars and cents</em>

dollars = quarters * 0.25 + dimes * 0.10 + nickels * 0.05 + pennies * 0.01

<em>#This prints the amount to 2 decimal places</em>

print("Amount ${:.2f}".format(dollars))

Read more about Python programs at:

brainly.com/question/22841107

7 0
2 years ago
A(n) ____ is an attack that takes advantage of a system vulnerability.
jarptica [38.1K]
<span>Exploit -</span> An attack that takes advantage of a system vulnerability, often<span> due to a combination of one or more improperly configured services.</span>
8 0
3 years ago
Big data are used to _____. Select 3 options.
jeka57 [31]

Answer:

AI, Interests, and marketing

Explanation:

Processing privacy policies is not a real function of a large data set.

8 0
3 years ago
Most IT security threats originate with hackers.<br> Question 3 options:<br> True<br> False
kap26 [50]
The answer is True they do originate with hackers
6 0
3 years ago
The classification of clouds is based on their _____.
goblinko [34]
Clouds might be ordered by shape and by height. Luke Howard, a British drug specialist was the first to portray cloud shapes utilizing Latin terms, for example, cirrus, cumulus or stratus. The division of mists into ten fundamental cloud structures or cloud genera depends on his productions.
5 0
3 years ago
Read 2 more answers
Other questions:
  • Write a new program called Lab7D that will read strings from a text file and turn them into "encrypted code". Create a bool func
    14·1 answer
  • Which command is used to combine two or more cells together into one cell?
    14·2 answers
  • 2) Search the Web for two or more sites that discuss the ongoing responsibilities of the security manager. What other components
    15·1 answer
  • Which is a circuit board located behind an LCD screen on a laptop?
    7·1 answer
  • Which process centers the spreadsheet's content on the page?
    15·1 answer
  • Scott is an aspiring software developer. During an interview for a new job, his prospective employer asks what kind of program h
    12·1 answer
  • What is the output?<br> &gt;&gt;&gt; phrase = "hello mom"<br> &gt;&gt;&gt; phrase upper()
    6·2 answers
  • Consider the code below. When you run this program, what is the output if the temperature is 77.3 degrees Fahrenheit?
    6·1 answer
  • Write a program that: Takes the list lotsOfNumbers and uses a loop to find the sum of all of the odd numbers in the list (hint:
    5·1 answer
  • Which of these apps could be a Trojan Horse designed to install malware on your system? Select all that apply. *
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!