1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
timofeeve [1]
3 years ago
14

What is the missing line of code? >>> >>> math.sqrt(16) 4.0 >>> math.ceil(5.20) 6

Computers and Technology
2 answers:
Alex787 [66]3 years ago
6 0

Answer:

import random

Explanation:

got it right

Blababa [14]3 years ago
3 0

Answer:

A math.pow reference

Explanation:

You might be interested in
   In the Start menu of Windows 7, you see your name listed as an option. Where does this shortcut lead if you select it?
ss7ja [257]
I do believe the answer is c. I used to own a computer with a windows 7 program.

5 0
4 years ago
What is a required device(s) used to connect to an ISP Network?
Whitepunk [10]
A .switch isp connect network
8 0
3 years ago
Read 2 more answers
Write a program to input any 10 numbers in an array and display it.​
Rom4ik [11]

Answer:

list1=[]

n=10

for i in range(n):

   z=int(input("Enter number:"))

   list1.append(z)

print(list1)

4 0
3 years ago
Read 2 more answers
This is me lol jjaaaabbooo
ElenaW [278]

i like your glasses uwu

6 0
3 years ago
Which of the following combines something you know, such as a password, with something you are (a biometric device such as a fin
yulyashka [42]

Answer:

c. Two-factor authentication

Explanation:

Two-factor authentication is also known as 2FA. It is an extra form of security put in place aside the use of username and password to ensure the authenticity of someone trying to access an online platform with a registered account.

First the user enters his or her username and password, then they will also have to provide some extra information before finally gaining access. Such information could be ones place of birth, name of pet, something one has or know, etc.

2FA helps to still keep an account safe even if a device or password is been stolen. Two-factor authentication could be SMSbased, hardware token, software token, etc.

4 0
4 years ago
Other questions:
  • You are given a string of n characters s[1 : : : n], which you believe to be a corrupted text document in which all punctuation
    12·1 answer
  • which type of website would a business selling merchandise on the internet use? A person B information C commercial D social
    9·1 answer
  • If the Update Automatically option is chosen in the Date and Time dialog box, _____. the date will automatically change each tim
    7·1 answer
  • Explain about RDBMS. Include advantages/ disadvantages. Compare DBMS vs RDBMS. Explain about Oracle as well.
    14·2 answers
  • write the structure of an email message ques.2 what do you mean by search engine? write its component .ques. 3 what are the adva
    9·1 answer
  • Which kind of results will appear using the search query "Frosty the Snowman" in quotation marks?
    6·1 answer
  • The challenge of preparing for ____________________ is in ensuring that employees do not feel that they are being prepared for t
    7·1 answer
  • How many registers are there in the memory unit?
    8·1 answer
  • It is common for people to name directories as dir1, dir2, and so on. When there are ten or more directories, the operating syst
    8·1 answer
  • list three things that can spoil a printer if they are not of the correct specification and what damage may be caused​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!