1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
snow_tiger [21]
2 years ago
11

Write a Python program to find whether a given number (accept from the user) is positive

Computers and Technology
1 answer:
Dennis_Churaev [7]2 years ago
3 0

Answer:

I need points sorry I don't know how to solve that

You might be interested in
Help brainleist giving exam
Digiron [165]

Explanation:

11. True

12: Electronic Fund Transfer

13. True

14. I'm not sure but I think yes?..

(I'm not sure if your including number 15 but just in case, the full form of PIN is personal identification number)

4 0
2 years ago
What subnet mask can be used to segment the 172.16.0.0 network to allow for a minimum of 6 subnets while maximizing the number o
marishachu [46]

The subnet mask can be utilized to segment the 172.16.0.0 network to qualify for a minimum of 6 subnets while maximizing the numeral of broadcasters per subnet is 255.255.224.0

<h3>What do subnet masks mean?</h3>
  • A subnet mask is a 32-bit numeral formed by setting keeper bits to all 0s and developing network times to all 1s.
  • In this way, the subnet mask divides the IP speech into the network and host addresses.
  • A subnet mask is used to separate an IP address into two pieces. One element defines the host (computer), and the different part identifies the network to which it belongs.
  • To better comprehend how IP lessons and subnet masks work, look at an IP speech and see how it's managed.

To learn more about  subnet mask, refer to:

brainly.com/question/3234986

#SPJ4

5 0
1 year ago
What are the six command groups in powerpoint
DiKsa [7]

Answer:

Clipboard, Slides, Font, Paragraph, Drawing, and Editing

3 0
3 years ago
It is okay to perform experiments without your teacher's permission. This shows creativity.
katrin2010 [14]
It would be False, because if you were to mess up it can result in something going bad.
5 0
3 years ago
Overview In this project you need to design and implement an Emergency Room Patients Healthcare Management System (ERPHMS) that
notka56 [123]

Answer:

Overview In this project you need to design and implement an Emergency Room Patients Healthcare Management System (ERPHMS) that uses stacks, queues, linked lists, and binary search tree ( in addition you can use all what you need from what you have learned in this course ) The system should be able to keep the patient’s records, visits, turns, diagnostics, treatments, observations, Physicians records, etc. It should allow you to

Explanation:

3 0
2 years ago
Other questions:
  • A network administrator is implementing dhcpv6 for the company. the administrator configures a router to send ra messages with m
    6·1 answer
  • What kind of problems could you run into if you format a cell with the wrong format for the data type?
    15·2 answers
  • All tif files start at offset 0 with what 6 hexadecimal characters?​
    11·1 answer
  • What is the multiple source test
    15·1 answer
  • Explain the importance of mobile computing in communication​
    5·1 answer
  • List out the storage measurements units of a computer .<br><br>​
    10·2 answers
  • Which Windows registry hive stores information about object linking and embedding (OLE) registrations
    11·1 answer
  • Which of the following is not considered essential for an electronic device to be called a computer?
    15·1 answer
  • The technologist has recorded the red cell morphology as macrocytic. which mcv value would confirm this observation?
    7·1 answer
  • the php function that is executed is a connection to a database cannot be made is the____ function. die | isset| end | connect.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!