1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lorasvet [3.4K]
3 years ago
15

Can somebody do an Algorithm 2 for more? (Python)

Computers and Technology
1 answer:
lisov135 [29]3 years ago
6 0

# If the number is positive, we print an appropriate message, else we print the opposite

num = 3

if num > 0:

print(num, "is a positive number.")

num = -1

elif num < 0:

print(num, "is a negative number.")

num = 0

else

print(num, "is neither positive nor negative.")

You might be interested in
Saturn has an orbital period of 29.46 years
Alona [7]

This is true. I'm not sure what you're asking here, but if it's a true/false statement, it's true.

3 0
3 years ago
Read 2 more answers
What would be the result after the following code is executed? int[] numbers = {40, 3, 5, 7, 8, 12, 10}; int value = numbers[0];
maw [93]

Answer:

The value variable will contain the lowest value in the numbers array.

Explanation:

Given

The given code segment

Required

The result of the code when executed

The illustration of the code is to determine the smallest of the array.

This is shown below

First, the value variable is initialized to the first index element

int value = numbers[0];

This iterates through the elements of the array starting from the second

 for (int i = 1; i < numbers.length; i++) {

This checks if current element is less than value.

     if (numbers[i] < value)

If yes, value is set to numbers[i]; which is smaller than value

value = numbers[i];

<em>Hence, the end result will save the smallest in value</em>

7 0
3 years ago
Redundancy can be implemented at a number of points throughout the security architecture, such as in ________. Group of answer c
vovikov84 [41]

Group of answer choices.

a. firewalls

b. access controls

c. proxy servers

d. All of the above

Answer:

d. All of the above

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Generally, redundancy to prevent unauthorized access can be implemented at a number of points throughout the security architecture, such as in firewalls, proxy servers and access controls.

A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device.

5 0
3 years ago
The ____ property configures a shadow effect on the text displayed within an element
Bogdan [553]
Shareder Is the answer I put. 
3 0
4 years ago
If the insertion point is positioned in the middle of a document when a second document is inserted, the first document is repla
kirill [66]
A.
I'm not sure tho, just trying to help.
7 0
4 years ago
Other questions:
  • Trisha is looking for a new table style. What is the fastest way for her to preview how different styles in the gallery would lo
    13·1 answer
  • Entering the formula =SUM(C5:C18) in cell C19 will result in which of the following?
    10·1 answer
  • A user prefers an external monitor, mouse, and keyboard for a laptop. The user does not want to use the built-in screen; however
    5·1 answer
  • Whic flag has a special role in debuging
    6·1 answer
  • Images from your .............. can be copied and pasted in a folder on your computer ​
    8·1 answer
  • Which option describes wearable technology?
    9·1 answer
  • Int value[10] = {1, -7, 95, 123, 80, 67, -30, 17, 152, 121} ;
    12·1 answer
  • Why is making a model, or prototype, important in the design process?
    6·1 answer
  • What might be some challenges if you’re trying to design a product for someone
    14·2 answers
  • Why is it important to register your software when you install it
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!