1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lerok [7]
3 years ago
5

I need help plzzzzzzz

Computers and Technology
1 answer:
Aleonysh [2.5K]3 years ago
3 0

By looking at your code, it seems like you're trying to let the user enter positive numbers until the user enters a negative number. To achieve this, you need to indent int(input("Enter a number, negative to stop")) inside the loop.

The second answer choice is correct.

You might be interested in
The cutting tool that has a zig zag edge is called a?
Tanya [424]
The cutting tool that has a zig zag edge is called “Pinking shears “
6 0
3 years ago
Trevor got home from work and suddenly realized that he needed to edit a certain file stored in the company network's server. ho
gregori [183]

I believe the answer is Virtual Private Network (VPN).

Know this answer is late, but im doing my deed hoping i this can help someone else pass this darn class. Best of Luck to whoever is taking the same course. You can do it if my lazy self can do it! It'll be okay ;)

3 0
3 years ago
One common command-line network utility tool is “netstat,” which displays which protocol is being used. It can review particular
labwork [276]

An example of two potential uses of this command is in the area or aspect of:

  • The troubleshoot of networking problems.
  • In configuration

<h3>What protocol does the netstat command use?</h3>

It is known to use the Internet Protocol (TCP/IP) and it is one that is used without parameters, this command  is said to often show active TCP connections.

<h3>What is netstat used for?</h3>

The network statistics ( netstat ) command is known to be a kind of a networking tool that is often used for troubleshooting and configuration, and this is one that can be used as a tool for monitoring for connections over the network.

Hence,  it is used in incoming and outgoing connections, routing tables, port listening, and others. Therefore, An example of two potential uses of this command is in the area or aspect of:

  • The troubleshoot of networking problems.
  • In configuration

Learn more about troubleshoot from

brainly.com/question/9572941

#SPJ1

3 0
2 years ago
Pick a web browser (a leading one or perhaps a lesser-known one that you use) and examine the Privacy and Security features and
Veseljchak [2.6K]

Solution :

<u>Chrome web browser</u>

The Chrome web browser uses a range of privacy and security settings for its customers. They include several security indicators as well as malware protection. Chrome uses the sandboxing technology, which prevents the harmful viruses and Trojans from reaching the computers.

Chrome provides a safe browsing by giving us an alert whenever we try to browse some harmful web sites.  It also warns you if we use a username and password combination which has been compromised in any data leak.

Chrome also serves to protect the individuals :

It provides a features of Ad blocking.

When we want to browse safely without being recognized or without storing any credentials, Chrome provides an Incognito mode.

Many businesses can be done on the internet using Chrome platform that is safe and authenticate to gather and collect data and information.

3 0
3 years ago
The application that Scott is writing has a flaw that occurs when two operations are attempted at the same time, resulting in un
Luden [163]

The type of flaw that the application is said to  have is known to be called race condition.

<h3>What is meant by race condition?</h3>

A race condition is known to be a form of unwanted situation that takes place when a device or system tries to carry out two or more operations at the same given time, but due to the nature of the device or system, the operations had to b be done in the right sequence to be carried out correctly.

Therefore, The type of flaw that the application is said to  have is known to be called race condition.

Learn more about race condition from

brainly.com/question/13445523

#SPJ1

3 0
2 years ago
Read 2 more answers
Other questions:
  • Which of the following filenames is acceptable on both Windows and Mac<br> operating systems?
    9·1 answer
  • If you have a 3D printer please show me a vid of you making something because I'm interested in getting one. Ty! Also can someon
    12·1 answer
  • 1.Characters archetypes are typical characters that represent universal patterns of human or human roles. (True or false)
    14·1 answer
  • Do you believe that OOP should be phased out and we should start working on some alternative
    6·1 answer
  • The section called Breaking Substitution Ciphers (p. 166) describes a "random substitution cipher," in which each letter of the
    11·1 answer
  • In order to make burger a chef needs the following ingredients one piece of chicken meat 3 lettuce leaves 6 tomato slices Write
    8·1 answer
  • Objects falling through air experience a type of friction called.. A.terminal velocity B.air resistance C.rolling friction
    8·1 answer
  • The access code for a? car's security system consists of fivefive digits. the first digit cannot be zerozero and the last digit
    13·1 answer
  • An IT firm came across a startup company that offers a new system of computer storage. It is currently in the experimental phase
    11·1 answer
  • Write two statements that each use malloc to allocate an int location for each pointer. Sample output for given program:
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!