1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OverLord2011 [107]
3 years ago
10

Write a program to output the following quote by Edsger W. Dijkstra:

Computers and Technology
1 answer:
ki77a [65]3 years ago
5 0

In python 3.8:

print("\"Computer Science is no more about \ncomputers\nthan astronomy is about telescopes\"\n-Edsger W. Dijkstra")

I hope this helps!

You might be interested in
The most important hardware device for connecting supercomputers over a wide area
juin [17]

Answer:

Hel

Explanation:

I think that they are:

  • <u>Processo</u><u>rs</u><u>:</u> Super computers posses tens of thousands of processors for performing billions of intensive computations on a single second.
  • <u>Memory</u><u>:</u> Supercomputers feature high volumes of memory, which allows the unit to access information at a given time.

7 0
3 years ago
A company has a main office and 12 branch offices. The users and computers are within a single domain. All servers are Windows S
LenaWriter [7]

Answer:

The answer to this question can be given as:

To access the server, the administrator must Configure L2TP with IPsec and MS-CHAPv2.

Explanation:

In this question, the user doesn't access the server by the User name and password. The User wants to access the server by the computer-level authentication. To access the server successfully user must Configure L2TP with IPsec and MS-CHAPv2. where L2TP with IPsec stands for Layer 2 Tunneling Protocol or it is also known as Virtual private network. It is a communications protocol that allows us to move data from one network to another in the encrypted form that is used by the IPsec. MS-CHAPv2 stands for Microsoft Challenge-Handshake Authentication Protocol that is developed by Microsoft. In computing, the CHAP provides the authentication to the user or network host entity. For example, this entity may be an internet service provider. And v2 stands for security.

So to access the server successfully, the administrator must Configure L2TP with IPsec and MS-CHAPv2.

8 0
3 years ago
When a pitcher is holding a baseball, the ball has ______energy.
MA_775_DIABLO [31]
Answer would be D)potential
3 0
3 years ago
Read 2 more answers
7.1 Write statements that create the following arrays: A 100-element int array referenced by the variable employeeNumbers. final
maria [59]

Answer:

A. int [ ] numbers = new int[employeeNumbers];

B. double[ ] numbers = new double[payRates];

C. float[ ] miles = new float[14];

D. char[ ] letters = new char[1000];

7.2 Size of array cannot be negative

Size of array should be a positive integer and not decimal.

7.4 The size declarator is used in a definition of an array to indicate the number of elements the array will have. A subscript is used to access a specific element in an array.

7.5 subscript to be out-of-bound means the specified integer is not within the range of the length of the array.

Explanation:

The question has answer given for some. I guess the explanation is what is needed.

A. The general format of creating an array is:

data type[] arrayRefVar=new datatype[size];

In this case, the datatype is int, arrayRefVar is numbers, size is employeeNumbers. The size was already initialised to 100 (employeeNumber).

B. A wrong datatype was used.

double[ ] numbers = new double[payRates];

would create an array of size 25 which is the payRates with types double.

C. The array was re-written using the general format of creating an array is:

data type[] arrayRefVar=new datatype[size];

D. The array was correctly defined.

7 0
4 years ago
1.
slamgirl [31]
1. I believe it this, they way the question is phrased it seems like a personal opinion. But if we're being logical about this, no one likes background noise. So,yes, it's important. 
2. Yes, when you record something you don't want additional sound that has nothing to do with what you're recording. 
3.Yes, your main task is to be focused on what you're doing on the computer. You don't want to be distracted by unnecessary distractions. 
8 0
3 years ago
Other questions:
  • HELP ASAP!! Ohms law homework
    11·1 answer
  • You are opening a existing file fot output. how do you open the file without erasing it
    7·1 answer
  • Chris needs to modify the default bullets that are used in a nonnumbered list in word. Which method should he use?
    9·2 answers
  • If you embed a Word table into PowerPoint, what happens when you make edits to the embedded data? A. Edits made to embedded data
    12·1 answer
  • Choose the correct statement about the UNIX family of operating systems:
    7·1 answer
  • write a function that given an integer Y and 3 non-empty string A,B,W, denotingthe year of vacations, the beginning month, the e
    5·1 answer
  • Why is it important to put the most specific case first? What types of errors does it help avoid?
    11·1 answer
  • Fill in the blanks
    7·1 answer
  • Creation of network is known as…?
    12·2 answers
  • How to view average for an assignment in gradebook in canvas.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!