1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Xelga [282]
3 years ago
5

Var1 = 1 var2 = 2 var3 = "3" print(var1 + var2 + var3)

Computers and Technology
1 answer:
Savatey [412]3 years ago
5 0

Explanation:

omg it's Python, I don't like it

I would say the answer is 33 or 6

You might be interested in
Which of the following SNSs has been associated with art work display?
amid [387]
Hoi!

I would say DeviantArt, since that is the world's largest social website dedicated to displaying artwork.
7 0
3 years ago
Read 2 more answers
In a ______________ graphic you can include text and pictures and you can apply colors, effects, and styles that coordinate with
DerKrebs [107]
In a presentation graphic
8 0
3 years ago
You manage a Ruby on Rails application that lives on a cluster of EC2 instances. Your website occasionally experiences brief, st
KIM [24]

Answer:

Option D Use Amazon SQS to decouple the application components and keep the requests in queue until the extra Auto-Scaling instances are available.

Explanation:

Amazon SQS is a service that user to decouple the application components and keep the request in queue. This is useful to ensure the distribution of message can be done more reliably and without losing the message. Amazon SQS increase the system fault tolerance. Multiple duplicated copies of the message will be stored across several availability zones to ensure the message are always available whenever it is needed.

5 0
4 years ago
Several new projects are being staffed by outside contractors who will be working on servers in the contractors' office, not in
OverLord2011 [107]

Answer:

<em>The VPN control that can be used to minimize employee's access to your network is, by enabling NAP VPN server which monitors client  computer trying to access your network, this is made possible by the NAP enforced client.</em>

Explanation:

<em>The VPN controls that can set up to minimize contract employees' access to your network is taken as follows:</em>

<em>The first step top take is to configure the Network Access Protection (NAP) allows an infrastructure to often check the client's computer if they are trying to get access to a network.</em>

<em>It is important such steps are taken for the overall protection of external threats and health of a network</em>

<em>Also we can state  some procedures and rules for a remote access by enabling the NAP VPN servers, that is to say, a client can be monitored for any kind or fishy activities, this is carried out by the NAP  client enforcement which will request access to a network.</em>

6 0
3 years ago
Hat are the technical risks and the human risks for the ticktacktoe game
Ierofanga [76]

Answer:

 The technical risk basically occur due to some possible impact modification in the system and due to some technical problem or issue in the entire infrastructure.

Human risk are mainly occur due to the human interference. The technical and human risks are the two main types of risks for ticktacktoe game.

The different types of risks that occur are as follows:

  •  The operational risk
  •   Strategic risk
  •   Compliance risk
  •   Program risk

8 0
3 years ago
Other questions:
  • What in Microsoft word brings up mini toolbar
    7·1 answer
  • Which one of these do not belong on the Do's list in Helpful Hints when preparing a presentation: Which one of these do not belo
    8·1 answer
  • What is the working principle of computer?
    9·1 answer
  • Why is it important to study in a quiet well lit area
    5·2 answers
  • Does the Main Content (MC) of a web page include searchboxes?
    8·2 answers
  • 1. provide at least 3 properties and 3 methods of the object computer.
    8·1 answer
  • Misspelet errors are displays with a ...<br>.. below them<br>​
    10·1 answer
  • Fill this blanks with the given words​
    6·1 answer
  • how does a demilitarized zone (dmz) work. A.By preventing a private network from sending malicious traffic to external networks
    10·1 answer
  • Which option is created specifically for giving a slide presentation in front of an audience and works when the speaker is utili
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!