1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AlekseyPX
3 years ago
11

Can you please look through this code and see wants wrong with it? its in python

Computers and Technology
1 answer:
Ivanshal [37]3 years ago
3 0
I’m confused what are you trying to ask? What is the python?
You might be interested in
A downloaded executable file may contain harmful software known as
mylen [45]

Answer:

A downloaded executable file may contain harmful software know as malware.

Further details:

Malwares:

Malware (a portmanteau for pernicious programming) is any product purposefully intended to make harm a PC, server, customer, or PC network. Malware does the harm after it is embedded or brought somehow or another into an objective's PC and can appear as legitimately executable code, contents, supposed "dynamic substance" (Microsoft Windows), and different types of data. Some sorts of malware are to a great extent alluded to in the media as PC infections, worms, Trojan steeds, ransomware, spyware, adware, and scareware, among different terms. Malware has a malignant expectation, acting against the enthusiasm of the PC client—thus does exclude programming that causes accidental damage because of some lack, which is regularly portrayed as a product bug.

Uses:

Malware is once in a while utilized comprehensively against government or corporate sites to assemble monitored information, or to upset their activity as a rule. However, malware can be utilized against people to pick up data, for example, individual recognizable proof numbers or subtleties, bank or charge card numbers, and passwords.

Answer details:

Subject: Computer and technology

Level: College

Keywords:

• Harmful software

• Malware

• Malware software

• Uses of malware

• Purpose of malware

Learn more to evaluate:

brainly.com/question/4997492

brainly.com/question/4010464

brainly.com/question/1754173

8 0
3 years ago
Read 2 more answers
Select all the items of the Design Elements.
maks197457 [2]
Answer: A: B: E: I think
5 0
3 years ago
Create a class ProblemSolution with following characteristics Two private member variables name & designation of string type
Romashka-Z-Leto [24]

Answer:

Please see the attachment for the solution

Explanation:

Download txt
4 0
4 years ago
When powering up the computer, the initial program loading and start-up is performed by using a ______________ program that is b
vitfil [10]

Answer:

The answer is Bootsrap

Explanation:

A bootstrap program which is also referred to as a bootstrap loader is a program that resides in the computer’s Read Only Memory. It starts the whole chain reaction and ends up with the entire OS being loaded. This program reads the computer’s hard drive boot sector and continues with the process of loading the Operating System. It first performs a POST test and then proceeds to load the OS intothe main memory.

4 0
4 years ago
Which of the following can you do under the fair use exceptions?
cricket20 [7]
I would say...

C: Use graphics and content for educational purposes in small amounts if you give the creator credit. 
6 0
4 years ago
Other questions:
  • An example of hardware is a _____. database spreadsheet monitor program used to enhance photos
    13·2 answers
  • I have been trying to work on this for a while now, and this is on excel
    11·1 answer
  • There are several factors that can substantially affect the consumer search process. Match the factor with an example of how the
    5·1 answer
  • Media messages are communicated through which of the following:
    8·2 answers
  • Explain why the control bus is not a bus.
    7·1 answer
  • Although “dog.jpg” and “dog.JPG” and “Dog.jpg” and “DOG.JPG” all appear to be the same file, they are not considered the same wh
    6·1 answer
  • The sample remote access policy document from the hospital that you reviewed in the lab showed that the Remote Access Domain is
    15·2 answers
  • Write a program whose input is two integers and whose output is the two integers swapped. Ex: If the input is: 38 then the outpu
    11·1 answer
  • Running the Disk Cleanup utility is a quick way to ________. Group of answer choices defrag your hard drive remove spyware progr
    10·1 answer
  • Which role will grant a delegate read-only access to a particular workspace within a user’s Outlook mailbox?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!