1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
laila [671]
3 years ago
11

Help asap dont answer with a link​

Computers and Technology
1 answer:
dezoksy [38]3 years ago
4 0

Answer:

90

Explanation:

dur nearly all my friends and family knows that

You might be interested in
What is the number system that uses only the numbers 0 and 1?
Lorico [155]
Its binary! In mathematics and digital electronics, a binary number is a number expressed in the base-2 numeral system or binary numeral system, which uses only two symbols: typically "0" (zero) and "1" (one).
8 0
3 years ago
Read 2 more answers
Confidentiality, integrity, and availability (C-I-A) are large components of access control. Integrity is __________. ensuring t
bazaltina [42]

Answer: ensuring that a system is not changed by a subject that is not authorized to do so

Explanation: Access control refers to pribcues which are employed in the bid thlo ensure the security of data and information. It provides the ability to authenticate and authorize access to information and data thereby preventing unwarranted access and tampering of the information. Integrity in terms of data security and access control is is concerned with modification to an existing or original data by unauthorized sources. When unauthorized addition or subtraction occurs on a data, the integrity of such data has been compromised. Therefore, authorization is required whenever a source is about to access certain information whereby only those with the right authorization code will be allowed, Inputting an incorrect pass code after a certain number of tries may result in system lock down as access control detects a a possible intrusion

4 0
3 years ago
A connection between files that allows data to be transferred from one file to another is a _______________________.
lisabon 2012 [21]

Answer:

Link

Explanation:

A Link is a term often used in computer application, data, or file management, that allows a user to carry out the operation of transferring data or information from one file to another often referred to as a target.

There are two types of major links, these include Symbolic links and Hard links.

Hence, in this case, A connection between files that allows data to be transferred from one file to another is a LINK

6 0
3 years ago
5.15 LAB: Count input length without spaces, periods, or commas Given a line of text as input, output the number of characters e
strojnjashka [21]

Answer:

Following are the code to this question:

userVal = input()#defining a variable userVal for input the value

x= 0#defining variable x that holds a value 0

for j in userVal:#defining for loop to count input value in number

   if not(j in " .,"):#defining if block that checks there is no spaces,periods,and commas in the value

       x += 1#increment the value of x by 1

print(x)#Print x variable value

Output:

Hello, My name is Alex.

17

Explanation:

In the above-given code, a variable "userVal" is defined that uses the input method for input the value from the user end, in the next line, an integer  variable "x" is defined, hold value, that is 0, in this variable, we count all values.

  • In the next line, for loop is defined that counts string value in number and inside the loop an if block is defined, that uses the not method to remove spaces, periods, and commas from the value and increment the value of x by 1.
  • In the last step, the print method is used, which prints the calculated value of the "x" variable.    

 

7 0
4 years ago
Read 2 more answers
What is equivalent to 5(3x-7)
serg [7]
5(3x - 7)

distribute the 5 to both 3x and -7

15x - 35 is equivalent

hope this helps
8 0
3 years ago
Read 2 more answers
Other questions:
  • You need to upgrade memory in a system but you don't have the motherboard documentation available. you open the case and notice
    9·1 answer
  • Select the correct answer. Ryan received an email from a person claiming that he is an employee of the bank in which Ryan has a
    11·2 answers
  • What is call by reference in function of c​
    13·1 answer
  • Now, it’s time for you to begin coding your text-based adventure game!Starting at the top, convert each line of your pseudocode
    6·2 answers
  • 20 points
    5·1 answer
  • C++Assign to maxSum the max of (numA, numB) PLUS the max of (numY, numZ). Use just one statement. Hint: Call FindMax() twice in
    8·1 answer
  • What is the importance of using Onedrive in Windows 10 and how knowledge of it will have an impact in today's workplace?
    7·2 answers
  • UPS or FedEx plays what role in the supply?
    9·1 answer
  • Laura is confused with the spelling of the word pronunciation. She types the word as pronounciation throughout a document. Which
    14·1 answer
  • Characteristics of partial copy sandboxes versus full sandboxes? choose 2 answers
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!