1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sever21 [200]
3 years ago
8

The average lease payment for a new vehicle is just over $450 per month for a three-year...

Computers and Technology
1 answer:
hichkok12 [17]3 years ago
7 0

Answer:

it depends on your insurance company

Explanation:

You might be interested in
What refers to the protocolâ s ability to ensure that data hasnâ t been modified in any way?
Tamiku [17]

Answer:

Option (b) Integrity

Explanation:

  • Data Integrity refers to the data which is not modified over the process, system.
  • Data Integrity here refers to which is not corrupted over the system in any way.
  • Throughout the life cycle of the process, system the data is intact and can be trusted for the future use.So, option (b) Integrity is the correct option.
  • Option (a) Confidentiality means the data that is kept secret, private but that doesn't mean it is not modified. So, option (a) confidentiality is wrong option.
  • Option (c) Authentication means the user is authenticated to use the data. It means the user has access to the data or not.So, option (c) is wrong option.
  • Option (d) Auditing means to examine, inspect a thing to find it fit for a purpose. Here, data auditing means verifying, inspecting,assessing the quality of data for a process.So, option (d) is wrong option.
3 0
3 years ago
What type of malicious software tries to gather information about you without your consent?
AlekseyPX

Answer:

B-malware

Explanation:

I do tech and i help work on computars.

6 0
3 years ago
Write the program to solve quadratic equations, but if the discriminant is negative, output
Firdavs [7]

Answer:

PROGRAM  QuadraticEquation Solver

  IMPLICIT  NONE

REAL :: a, b, c ;

  REA :: d ;

  REAL  :: root1, root2 ;

//read in the coefficients a, b and c

  READ(*,*)    a, b, c  

  WRITE(*,*)   'a = ', a

  WRITE(*,*)   'b = ', b

  WRITE(*,*)    'c = ', c

  WRITE(*,*)

// computing the square root of discriminant d

  d = b*b - 4.0*a*c

  IF (d >= 0.0) THEN              //checking if it is solvable?

     d     = SQRT(d)

     root1 = (-b + d)/(2.0*a)     // first root

     root2 = (-b - d)/(2.0*a)     // second root

     WRITE(*,*)  'Roots are ', root1, ' and ', root2

  ELSE                            //complex roots

     WRITE(*,*)  'There is no real roots!'

     WRITE(*,*)  'Discriminant = ', d

  END IF

END PROGRAM  QuadraticEquationSolver

8 0
4 years ago
Mac os is based on the ____ operating system.
ankoles [38]
Mac os is based on the UNIX operating system.
4 0
3 years ago
What are important requirements for a frame of reference to identify an object's location, and to communicate that location to a
gogolik [260]

Answer:  Set a scale, or method of determining distance, within your system. Identify an origin near an object—specifically something fixed.

Explanation:

4 0
3 years ago
Other questions:
  • 9. In Electronic Codebook (ECB): a. The message is broken into independent blocks which are encrypted b. The message is broken i
    6·1 answer
  • ISBN-13 is a new standard for identifying books. It uses 13 digits d1d2d3d4d5d6d7d8d9d10d11d12d13. The last digit d13 is a check
    9·1 answer
  • Select the correct answer.
    9·1 answer
  • The isometric projection camera technique provides an illusion of perspective by using things like parallax scrolling to create
    10·1 answer
  • ____ is the official web portal for the U.S. government, providing access to all official U.S. government services and informati
    12·1 answer
  • Every command or instruction is called
    8·2 answers
  • LAB: Convert to binary - methods
    11·1 answer
  • 7. A patent is an example of a rare and valuable resource. Indicate whether the statement is true or false and also justify it.
    14·1 answer
  • A user logs in to a virtual world and creates an animated character representing themselves, which they then use to move through
    15·2 answers
  • For a web application we associate a web server, for a mobile application we associate a mobile server. for a decentralized appl
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!