1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lerok [7]
2 years ago
10

The cost of an items is Rs 200. what will be the cost of 50 such items. write a simple program​

Computers and Technology
1 answer:
alexandr402 [8]2 years ago
4 0

Answer:

In Python:

Unit_Cost = 200

Cost50 = 50 * Unit_Cost

print("Cost of 50 items: Rs."+str(Cost50))

Explanation:

This initializes the unit cost to 200

Unit_Cost = 200

This calculates the cost of 50 of such items

Cost50 = 50 * Unit_Cost

This prints the calculated cost

print("Cost of 50 items: Rs."+str(Cost50))

You might be interested in
6.An organization wants to implement a remote dial-in server to ensure that personnel can connect to the organization's network
Sauron [17]

Answer:

Challenge-Handshake Authentication Protocol (CHAP).

Explanation:

In Computer technology, authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification.

In this scenario, an organization wants to implement a remote dial-in server to ensure that personnel can connect to the organization's network from remote locations. The authentication protocol must include encryption to prevent hackers from accessing the network.

Hence, the protocol which should be used is Challenge-Handshake Authentication Protocol (CHAP).

A Challenge-Handshake Authentication Protocol (CHAP) can be defined as a standard network access control protocol in which a client program dials in to a network access server to receive a random value and identification number that can only be used once.

5 0
3 years ago
What type of Microsoft Server serves as an email server?
Misha Larkins [42]
I have a feeling you're looking for Microsoft Outlook.
4 0
3 years ago
Read 2 more answers
Outline the steps necessary to prepare a storage device for storing files. Identify and briefly describe the tools used to prepa
Fantom [35]

Answer:

Outline the steps necessary to prepare a storage device for storing files.

  1. Link the storage unit to a network, whether it be a laptop computer or a mobile device.
  2. Firewall it with sufficient anti-virus so that it also does not affect the linked system.
  3. The program must auto-install the storage device on the network after quarantine, and authorize it.
  4. Test the file that requires to be moved to the storage device, then upload it to the storage device after anti virus is safe.
  5. Should not directly pull the storage device out of the network, select the exit device option correctly and only then remove the device after it has been accepted.

Identify and briefly describe the tools used to prepare a storage device for storing files.

<em>EFSDump -</em> Users can share encrypted files by carrying certificates by using EFSDump. It is usually very time consuming to audit the users who have privileges. But it is very simple to list users who have access to encrypted files using EFSDump.

<em>SDelete -</em> Suppose Windows operating system eliminates the index and prevents access when we delete a file. All the same, attackers can still recover the contents of the file. Files that are encrypted by EFS leave the file behind on the disk. Using the SDelete tool we can modify free space to prevent the recovery of deleted files.

Explain why file systems are critical components of an operating system. What is their purpose?

Hypothetically defining file system is nothing more than the way files are called and logically organized for storage.

Ex: DOS, Windows, and Unix-based operating systems all contain various file systems where data is organized in tree structure.

Usually defines the naming of files, how long the suffix can be. The file system often includes a format indicating the access to a file.

Specify the file system or file systems that would be available with that operating system.

A file system controls the mechanism by which data is stored and accessed on a disk. This deals mainly with internal disk operations such as naming files, records, directories, documentation, storage management, and other protocol accesses.

  1. FAT (File Allocation Table)
  2. NTFS (New Technology File System)

Describe from an administrator perspective what is necessary to prepare a storage device for access by a user.

Connection to the storage unit is equipment-oriented. The Windows Explorer summary contains optical drives, USB keys and hard drives as separate devices, making it much easier to navigate a new computer.

To connect a Linux computer you must mount the drive by connecting it to a directory.

Usually mounting a device is a manual operation, since only the administrator determines which directory the system attaches to.

Graphical interfaces are seldom seen on Linux servers. When you plug a storage device into a USB port on your computer, nothing can happen.

Usually the mount command looks like mount/dev / sdb1/mnt, where /dev / sdb1 is the system and /mnt is the directory you want to mount it.

List a few ways that a user can utilize a file system.

System output can be improved not only by choosing the most appropriate file system(s) but also by using the various choices available for most file systems.

There are variations in the number of options depending on the specific file system, and some options can only be set at the time of development of the filesystem, even though it can be modified afterwards.

7 0
3 years ago
A thick black line around the outside edge of a page is a _____.
Montano1993 [528]
B. Border. It borders the outer page.
7 0
3 years ago
Read 2 more answers
What are the ethical implications of online social media after someone has died?
ZanzabumX [31]
<span>Think about the things people might have wanted private, but after death they have no control.</span>
8 0
3 years ago
Other questions:
  • Local television news networks cover only
    8·2 answers
  • If you were to conduct an Internet search on vegetarian restaurants, which of the following searches would be the best
    7·1 answer
  • What are the basic characteristics of object-oriented analysis and design (OOAD)? How does OOAD compare to structured analysis a
    12·1 answer
  • Which nmap switch is used to detect target OS and services?<br> a -S<br> b -p<br> c -F<br> d -A
    8·1 answer
  • ECG mashine is an example of
    12·1 answer
  • A user reports that he cleared a paper jam and now cannot print. The technician reseats the paper and then prints a test page fr
    14·1 answer
  • What does digital mean, in the term of computer science.
    11·1 answer
  • Which of the following does not represent the function of a Variable? Variables store data in memory; this data has limited use
    8·1 answer
  • Which of the following correctly declares and initializes a Scanner object that will use input from the keyboard as its data sou
    13·2 answers
  • This feature automatically creates tables of contents.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!