1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kipish [7]
3 years ago
5

1111111111111111111111111111

Computers and Technology
1 answer:
NISA [10]3 years ago
3 0

Answer:

in order to use correct codes, ensure the variables in loops are in brackets

You might be interested in
In 1-2 pages, identify a social networking technology and identify at least 10 security and/or privacy risks the technology has
algol13

Answer:

One of the biggest social media giants has faced many such security and privacy risks in the past 3 years. 10 are listed below:

1. No one can forget the New Zealand attack on the mosque, and it was telecast live via it. And that is certainly a security risk. And if someone is able to stream live, the AI is in question definitely as this cannot be telecast.

2. Can you forget the various US shooting cases in the past 5 years? And many out of them where telecast lives on it. Again the AI, and the authentication is in question.

3. Many evils have many times advertised itself through it, and that is a security risk. This put up the question on the Data Scientists of the company.

4. It's a huge data on it, and many users have been able to misuse it, and that is a security risk. This put up the question mark on the application of the Big Data.

5. Once, the UK parliament questioned it to sell the secret data, and that was a privacy risk.

6. An Engineer was caught negotiating to sell secret users data to a third party, and that is a privacy risk as well as a question on management technology, as its possible now to check these kind of frauds.

7. Its accounts have been hacked many times, as well as millions of user-profiles, were stolen. This is a security and privacy risk.

8. Its data is still not safe as evils have proved they can break the authentication. However, it has reacted well, and they look like being a safe destination now.

9. Once, someone from Russia was caught collecting a lot of data from it. That was a security and privacy risk. And surely if someone is uploading a lot of complicated and confidential data, must be checked through proper AI implementation.

10. In India too there have been claims that a lot of personal information during elections 2014 was sold. That was a security and data risk. And the data scientists were proved vulnerable again. Its quite sure hence, a lot of work has to be done in Data Science and Artificial intelligence still.

However, its owner is one of the finest souls on earth. He donated all his money when he was blessed with a child. Some out of his team cheated, and else some technology failure or the huge amount of data was the reason for the fault. However, other companies are also facing such problems. And hence, he cannot be blamed for this. And the company now definitely has recovered from the nightmare that they faced in the past 3 years.

Explanation:

The answer is self explanatory.

8 0
3 years ago
When would you use conditional formatting on a cell?
Charra [1.4K]
You use conditional formatting on a cell if the numbers are less then zero.
4 0
3 years ago
What is NOT powered by the PSU of your computer?
Yuliya22 [10]
Peripherals like your monitor or your printer.
3 0
3 years ago
4.12 LAB: Using math methods Given three floating-point numbers x, y, and z, output x to the power of z, x to the power of (y to
Greeley [361]

Answer:

The function is as follows:

import math

def func(x,y,z):

   print(math.pow(x, z))

   print(math.pow(x,math.pow(y, z)))

   print(math.fabs(y))

   print(math.sqrt(math.pow(x*y,z)))

Explanation:

This imports the math library

import math

This defines the function

def func(x,y,z):

Print the stated outputs as it is in the question

<em>    print(math.pow(x, z)) ---> x to power x</em>

<em>    print(math.pow(x,math.pow(y, z))) ---- x to power of y of z</em>

<em>    print(math.fabs(y)) ---- absolute of y</em>

<em>    print(math.sqrt(math.pow(x*y,z))) --- square root of xy power x</em>

<em />

4 0
4 years ago
What are the pros and cons of using the internet in a medical office setting
kherson [118]
The Pros of using the internet in a medical office setting are mostly that an unlimited amount of knowledge can be gained with the click of a button, and communications between doctors are practically instantaneous. The cons are mostly that these systems can be hacked into, which can leak patient information, and that sometime the Internet can "go down", which can reduce productivity. 
4 0
3 years ago
Other questions:
  • Secondary storage devices that are input and output devices include all except:
    10·1 answer
  • ____ programs are software programs that are distributed on the honor system.
    7·2 answers
  • In the dewey decimal sysytem, the call number 800 notes which section
    10·1 answer
  • Which of the following is an Example of a technical (“hard”) skill
    6·2 answers
  • What is the difference between a technological problem and a technological opportunity? Explain with an example.
    7·2 answers
  • Which of the following happens when you enter the formula =G15 into a cell?
    12·1 answer
  • you are working on creating a business document with two other co-workers. Based on just information, which of the following pre
    14·1 answer
  • In the program below, which two variables have the same scope?
    9·2 answers
  • What are the ten application areas of computer?​
    10·1 answer
  • If you need to modify a features in a part created using the Mirror tool, you can make the change in the original feature and th
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!