1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ANEK [815]
3 years ago
15

What will you see on the next line? >>>int(12.8) ___

Computers and Technology
1 answer:
FrozenT [24]3 years ago
8 0

Answer:

12

Explanation:

When you use the int() function on a float, it only cuts off everything past the decimal. Literally all it does. Also, the int() function doesn't round the number. Thus, proving the answer is 12.

hope i helped :D

You might be interested in
Help<br><br> My internet won't work on my other pc i tried a lot to get it back
sladkih [1.3K]

Have you tried restarting your internet yet? I'm not very skilled with stuff like this, but my dad sometimes does that if nothing else is working.

Hope you can figure it out!

7 0
3 years ago
Read 2 more answers
Based on the information in the table, which of the following tasks is likely to take the longest amount of time when scaled up
kakasveta [241]

Answer:

Task A

Explanation:

8 0
3 years ago
According to the 2010/2011 Computer Crime and Security Survey, ____ is "the most commonly seen attack, with 67.1 percent of resp
loris [4]

Answer:

Malware infection

Explanation:

Infecting computers with malware through the internet has become the most commonly seen attack according to 2010/2011 Computer Crime and Security Survey.

6 0
3 years ago
Refer to the exhibit. A network security analyst is using the Follow TCP Stream feature in Wireshark to rebuild the TCP transact
Mnenie [13.5K]

Answer:

Binary file.

Explanation:

                           In this case, the network security analyst is using the Follow TCP Stream feature in Wireshark to rebuild the TCP transaction. However, the transaction data seems indecipherable. The explanation for this is that the TCP transaction file is a Binary File and because of this the network secuirty analyst is unable to decipher the transaction file.

                           The solution for this is to convert the binary file into text file which is human readable.

3 0
3 years ago
NAND is logically complete. Use only NAND gates to constructgate-level circuits that compute the
Drupady [299]

Answer:

Hi, for this exercise we have two laws to bear in mind:

Morgan's laws

NOT(А).NOT(В) = NOT(A) + NOT (B)

NOT(A) + NOT (B) = NOT(А).NOT(В)

And the table of the Nand

INPUT OUTPUT

A B A NAND B

0 0         1

0 1         1

1 0         1

1 1         0

Let's start!

a.

Input            OUTPUT

A       A     A NAND A

1         1             0

0        0            1

b.

Input            OUTPUT

A       B     (A NAND B ) NAND (A NAND B )

0         0            0

0         1            0

1          0             0

1          1             1

C.

Input            OUTPUT

A       B     (A NAND A ) NAND (B NAND B )

0        0           0

0        1             1

1         0            1

1          1            1

Explanation:

In the first one, we only need one input in this case A and comparing with the truth table we have the not gate

In the second case, we have to negate the AND an as we know how to build a not, we only have to make a nand in the two inputs (A, B) and the make another nand with that output.

In the third case we have that the OR is A + B and we know in base of the morgan's law that:

A + B = NOT(NOT(А).NOT(В))

So, we have to negate the two inputs and after make nand with the two inputs negated.

I hope it's help you.

3 0
3 years ago
Other questions:
  • You should type------ space(s) after a period at the end of a sentence.
    13·2 answers
  • In an excel table, which of the following represents a column of data?
    8·1 answer
  • A host sends a packet to a local server on the company's wired ethernet lan via an access point. how many frames are necessary f
    6·1 answer
  • Your computer running Windows 7 is doing some very strange things with the operating system. You are fairly certain it is not a
    10·1 answer
  • Which feature of a browser will you select to block pop-ups? view help tools file
    15·2 answers
  • .exe, .msi, .msp, .inf - together, what do these filetypes indicate
    12·2 answers
  • Explain the difference between the legal protections a security officer enjoys and the legal protections a police officer receiv
    12·2 answers
  • Which of the following is considered a basic task in the context of computer operations? a. Connecting to the Internet b. Natura
    6·1 answer
  • Read a sentence from the console.
    6·1 answer
  • The platform in E-Learning refers to:
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!