1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lara31 [8.8K]
3 years ago
15

Write a program that assigns values to

Computers and Technology
1 answer:
ss7ja [257]3 years ago
3 0

Explanation:

10:A program that assigns the sum 20,30,40

20: input 20,30,40

30:sum input

40: print total

End

You might be interested in
What is A wage paid based on the ability to sell a product or service is (a) _____.
Fantom [35]
The answer is commissioned
5 0
4 years ago
The web development team is having difficulty connecting by ssh to your local web server, and you notice the proper rule is miss
joja [24]

Answer:

Option b (Port 22) seems to the appropriate choice.

Explanation:

<u>Below seem to be some measure you should take to correct this mistake.</u>

  • Verify whether Droplet's host IP address seems to be right.  
  • Verify existing connection supports communication over all the utilized SSH port. Any access points can be able to block port 22 and sometimes customized SSH. For illustration, you could do this by checking different hosts who used the same port, using only a recognized working SSH connection. These could help you identify unless the current problem is not particular to clients' Droplet.
  • Authenticate the Droplet configuration settings. Verify that they're not being configured to DROP 's preferred policy, and do not apply the port to require connectivity.

The SSH server also operates on port 22, by default.  

Other choices don't apply to the specified scenario. So that the argument presented above will be appropriate.

7 0
3 years ago
Respond to Social EngineeringYou work as the IT security administrator for a small corporate network. The company president has
Cloud [144]

Answer:

Delete any emails that are attempts at social engineering

Explanation:

The actual URL of an email could tell if an hazardous, an unwanted or an unexpected email is being received, hence one can be sure of social engineering through this means. Hence, this could provide a solution to this problem.

4 0
4 years ago
When using correct ergonomic technique be sure to _____.
jeka57 [31]

Answer: The answer is C

4 0
4 years ago
Read 2 more answers
What is Computer system software <br>​
myrzilka [38]

Answer:

<em><u>System</u></em><em><u> </u></em><em><u>soft</u></em><em><u>ware</u></em> is software designed to provide a platform for other software...

6 0
4 years ago
Other questions:
  • I have one big question <br><br><br> WHAT CAN I DO WHEN I'M BORED
    6·2 answers
  • Which is NOT a type of SD card?
    8·2 answers
  • Why are video games interesting?
    5·1 answer
  • An intranet that is partially accessible to authorized people outside the business or organization is known as an
    7·2 answers
  • witch option in a presentation program contains the formatting and placeholders for all the items that appear on a slide?
    11·2 answers
  • A SOHO's connection to the internet is through an antenna that sends and receives a microwave signal to the ISP's antenna. There
    8·1 answer
  • Yo, my Lenovo laptop keeps showing this screen but I can't sign in, can someone help me?
    5·2 answers
  • What is the name of tool in number 9 picture? CAPITAL LETTER ONLY
    5·1 answer
  • Somebody pls help!!! i don’t know what i did but i don’t know how to fix it
    8·1 answer
  • Which of these examples demonstrate portfolio income?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!