1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fynjy0 [20]
3 years ago
11

PYTHON HW PLEASE HELP. I NEED THE ACTUAL CODE!!! 100 POINTS AND BRAINLIEST. REPORTING IF YOU DON'T ANSWER

Computers and Technology
1 answer:
Alex73 [517]3 years ago
4 0

Answer:

Here maybe this will help you

Explanation:

Download pdf
You might be interested in
AUPs ensure that an organization’s network and internet are not abused. Select 3 options that describe AUPs.
tigry1 [53]

AUPs often involves not going onto unauthorized sites or downloading certain content, not using the service to violate any law, and not connecting to unauthorized devices through the network.

<h3>What is AUP?</h3>

AUP stands for Acceptable Use Policy, which refers to a policy that regulates users when they access a corporate newtork.

<h3>How does an AUP regulates users?</h3>

Most AUPs imply:

  • Users can only access certain sites and dowloading specific content is forbidden.
  • The access to the internet or network cannot be used for criminal purposes.
  • Only authorized users can connect to the corporate network.

Learn more about AUP in: brainly.com/question/9509517

#SPJ1

8 0
2 years ago
Choose the list of the best uses for word processing software.
Marina86 [1]
List, resumes, spread sheet, databases, contracts
4 0
3 years ago
The decryption broker feature is supported by which three Palo Alto networks firewall series
dalvyx [7]

Answer:

See the explanation section

Explanation:

Decryption broker features is supported for the following:

PA-7000 Series devices

PA-5200 Series devices

PA-3200 Series devices

The model supported by the decryption broker features include:

VM-300 model

VM-500 model

VM-700 models.

They usually requires SSL Forward Proxy decryption to be enabled, where the firewall is established as a trusted third party to session traffic.

3 0
3 years ago
Which of the following is NOT a cost typically associated with owning a car?
Arturiano [62]
A. fuel ; when you but a car you aren't buying the gas to go in it 
3 0
3 years ago
For which tasks would Excel be useful? Check all that apply.
viktelen [127]

Answer:

Creating charts or graphs

Bringing data together

Storing Financial data

Explanation:

Excel is great at creating charts and graphs

Also good at compiling data

You wouldn't necessarily want to type an essay in excel, so not for writing an essay

You cannot schedule appointments through excel, although I guess if you really wanted to you could organize them in excel

Excel is fine for storing financial data, you can even manipulate it in the program

You cannot draw conclusions using excel directly, although you can organize data in such a way using excel that it makes it easy to identify trends and such for you to draw your conclusions

5 0
2 years ago
Other questions:
  • What are two fundamental components of data structures?
    10·1 answer
  • Is it more beneficial to have many folders or is it better to " nest subfolders? Explain your response
    5·1 answer
  • The ________ of a cpu dictates how many instructions the cpu can process each second.
    12·1 answer
  • Linda is training to become a certified network design expert and consultant. While researching about the process of cellular ra
    12·1 answer
  • 1. Write an expression whose value is the result of converting the str value associated with s to an int value. So if s were ass
    12·1 answer
  • Anyone help pls ? Complete the code below to add css to make the background of the web page orange.
    10·1 answer
  • 1. Write a method to measure sortedness of an array. The method header is:
    14·1 answer
  • ____ returns the maximum number of elements that can be inserted into the vector container vecCont without reallocation.
    9·1 answer
  • Ken has discovered that a vice president of his company has been using his computer to send data about a new product to a compet
    15·1 answer
  • How can I use HTML to express a personal value
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!