1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nasty-shy [4]
3 years ago
5

For the function below, which variables have the same scope?

Computers and Technology
2 answers:
steposvetlana [31]3 years ago
5 0

Answer:

numB and power

Explanation:

Correct answer edge 2020

Margarita [4]3 years ago
3 0

Answer:

numB والقوة

Explanation:

حافة الإجابة الصحيحة 2020

You might be interested in
.2. What approach to deviance do you find most persuasive: that
garik1379 [7]

Answer:

The description for the given question is described in the explanation section below.

Explanation:

Since deviance constitutes a breach of a people's current standard. I believe Erickson's psychological concept that Deviance becomes a trait that is commonly considered to need social control agencies' intervention, i.e. 'Something must being done'.

  • There most probably resulted whenever the rules governing behavior appear inconsistent in just about any particular frame.
  • Therefore the principle of this theory is that even in the analysis of deviance this same significant point seems to be the social community, instead of the participant.
8 0
4 years ago
To keep information beyond reach of unauthorized users, is to keep the information _____. Group of answer choices simple verifia
nasty-shy [4]

Answer:

Secure is the correct answer for the above question.

Explanation:

  • When any person wants that any information is not hacked by any user then he needs to secure the information with the help of any security mechanism. This security mechanism can be of any type that facilities the user to stop the information are being hacked.
  • The above question asked about the work which is needed to stop the message is being hacked. So there is a need to secure the information. so secure is the correct option while the other option is not valid because "simple, economical or verifiable" can not stop the message from accessed by the unauthorized user.
7 0
3 years ago
" _____ is a measure of the amount of information that can travel from a user to the Internet in a given amount of time."
Ainat [17]

Answer:

The answer is Upload bandwidth

Explanation:

Bandwidth refers to the highest transfer rate of data on an internet connection or network.

Upload bandwidth is the amount of data that moves from a computer to the internet or a network within a given amount of time. Documents, music files, video files, software and so on can be uploaded to the internet or a network.

6 0
3 years ago
Who plays Roblox and wants to be friends on it
qaws [65]
I have roblox and I would like to be friends on it
4 0
3 years ago
Read 2 more answers
17.8.1: Writing a recursive math function. Write code to complete raise_to_power(). Note: This example is for practicing recursi
Yuliya22 [10]

Answer:

The recursion function is as follows:

def raise_to_power(num, power):

if power == 0:

 return 1

elif power == 1:

 return num

else:

 return (num*raise_to_power(num, power-1))

Explanation:

This defines the function

def raise_to_power(num, power):

If power is 0, this returns 1

if power == 0:

 return 1

If power is 1, this returns num

elif power == 1:

 return num

If otherwise, it calculates the power recursively

else:

 return (num*raise_to_power(num, power-1))

6 0
3 years ago
Other questions:
  • In an advanced word processing program which type of image or graphic is available in a variety of formats and styles?
    12·2 answers
  • Your school computer library has a network that connects computers and devices within a few small rooms. what type of network do
    7·1 answer
  • What type of social engineering attack uses email to direct you to their their website where they claim you need to update/valid
    6·2 answers
  • Sharing a workbook helps to complete ________ (A, tasks) (B,changes) (C, typing) on time. Multiple people acssessing the workboo
    9·1 answer
  • What is the output of the second println statement in the main method, public class foo { int i ; static int s ; public sttic vo
    15·1 answer
  • E-mail has made it very easy to send a message to more than one person at any time of day from just about anywhere. If you wante
    12·2 answers
  • Write a method that accepts a string as an argument and checks it for proper capitalization and punctuation. The method should d
    14·1 answer
  • if you were determining what was expected of you simply by looking at media, what messages would you take away?
    8·2 answers
  • When evaluating platforms, what is the key factor in ensuring a platform addresses an organization's needs?
    8·1 answer
  • How does communication produce clarity and direction​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!