1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kakasveta [241]
3 years ago
6

X = 10 y = 20 x > y print("if statement") print("else statement")

Computers and Technology
1 answer:
Eduardwww [97]3 years ago
8 0
I dont really understand what you want to do but im gonna answer it as if I understood it.

If x is 10 and y is 20 then y is larger than x
You might be interested in
What is the difference between a network intrusion detection system (NIDS) and a network intrusion prevention system (NIPS)?
alisha [4.7K]

Answer:

Detection vs Prevention

Explanation:

  • A Network Intrusion Detection System as the name suggests it "detects" the attackers / vulnerabilities existed in the network system / infrastructure.
  • A Network Intrusion Prevention Detection System as the name suggests it "prevents" the attackers from hacking the system. While a detection just detects the abnormalities where as a prevention system can prevent them.
  • The detection system detects the vulnerabilities, security threats and the attackers in the system through the web traffic analyzers and security analyzers.
  • The prevention system prevents the network from being compromised. It tries to regain the access if already compromised.
  • Both the NIDS and NIPS have to be coordinated for the full protection of the network.
8 0
3 years ago
Real estate management software
andre [41]

Answer:

nTireFM

Explanation:

is a comprehensive system for real estate vendors with unique and reliable needs. Real Estate Management Software simplifies your life as a real estate investor monitors the financial performance of each rental property

5 0
1 year ago
Help me please. i need you help​
Fudgin [204]

Answer:

Can you provide the code

7 0
3 years ago
(b) The CPU is responsible for processing instructions.
Yakvenalex [24]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The CPU is responsible for processing instruction. CPU instruction processing goes through three stages. Fetch, Decode, and Execute.

When the program runs,  program code is copied from secondary storage into main memory. CPU's program counter set to the first instruction of the program stored in memory where the program starts executing.

When a program is being executed, it goes through fetch-decode-cycle. which repeats over and over again until reaching the STOP instruction.

The processor check which next instruction to be executed, then the processor fetches that instruction value from the memory location.  once the instruction being fetched it gets decoded and executed. This instruction processing cycle repeating until the CPU finds a stop instruction.

6 0
3 years ago
Read 2 more answers
What kind of a computer language could PROGRAM A be referred as?
Svetlanka [38]

Answer:

A programming language is a vocabulary and set of grammatical rules for instructing a computer or computing device to perform specific tasks. The term programming language usually refers to high-level languages, such as BASIC, C, C++, COBOL, Java, FORTRAN, Ada, and Pascal.

4 0
3 years ago
Other questions:
  • What does the Additional Clock tab do?
    11·1 answer
  • Design a GUI program to find the weighted average of four test scores. The four test scores and their respective weights are giv
    5·1 answer
  • The program is to be answered in Java Programming not C++ Please answer the following: Modify the BarChart program to accept the
    6·1 answer
  • What is the most recent version of Microsoft Windows?
    12·2 answers
  • / Looks up author of selected books
    15·1 answer
  • Which TWO objects are likely to have SSD chips in them?
    5·2 answers
  • You have installed Windows Server 2016 on a new server and want to centralize user logons and security policies. What type of so
    13·1 answer
  • Which window would show you bindings for local area connection 2?
    5·1 answer
  • When methods have ____, other programs and methods may use the methods to get access to the private data.
    5·1 answer
  • what component of virtualization controls all physical memory, and thus has the ability to make any unused memory pages in each
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!