1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vampirchik [111]
3 years ago
10

Algorithm Read marks and print letter grade according to that.

Computers and Technology
1 answer:
Romashka-Z-Leto [24]3 years ago
3 0

Answer:

OKAYYYY

Explanation:

BIJJJJJJJSGJSKWOWJWNWHWHEHIWJAJWJHWHS SJSJBEJEJEJEJE SJEJBEBE

You might be interested in
What would be the result of running the command chown :root file1.txt
REY [17]

Answer:

b. This would set the group ownership of file1 to root.

Explanation:

Linux allows user to have his own files and regulate the ability of other users to access them. The <em>chown</em> command allows you to use the appropriate utility to change the owner of a file or directory.

The basic command syntax is as follows:

# chown [options] <owner name: owner group name> <file or directory name>

For example, if you want to give a user <em>root</em> opportunity to use the <em>file1.txt</em> file as he wishes, you can use the following command:

# chown root file1.txt

In addition to changing the owner of a file, the group of its owners or both can be changed at the same time. Use a colon to separate the username and user group name (without the space character):

# chown user2:group2 file1.txt

As a result, the user with the name <em>user2</em> will become the owner of the <em>file1.txt</em> and its group will become <em>group2</em>.

In your case omitting username

# chown :root file1.txt

will change owner group only.

8 0
4 years ago
100 tickets are sold in a raffle with one prize. John has 8 tickets, Jamie has 10 tickets, find the probability that John wins
Reika [66]

\frac{8}{100} or \frac{2}{25}
7 0
3 years ago
Read 2 more answers
Write a SQL query to display films in inventory that have never been rented for all stores. Include inventory ID, film ID, film
Gemiola [76]

Answer:

SELECT inventory_id, film_id, title, store_id, address_id

FROM Inventory.Inventory

JOIN Business.store ON Inventory.store_id = store.store_id

JOIN Business.rental ON rental.film_id = Inventory.film_id

JOIN film_text ON Inventory.film_id = film_text.film_id

WHERE COUNT(rental_id) = 0;

Explanation:

The JOIN clause is also used to query tables from two databases. The Inventory and the Business database are joined in the inventory and store table respectively. The Query also joins the inventory table and the film_text table to get the title or name of the film rented where the rental_id count is equal to zero.

8 0
3 years ago
Please help!!
kolbaska11 [484]

Answer:

HTML is the standard markup language for creating and designing websites

while

HTML5 is the fifth and the latest version of HTML

with new added features,tags and element

6 0
3 years ago
Which of the following assignment statements contains a LOGICAL error? I multiply two numbers when they need to be added I write
valentinak56 [21]

Answer:

(a) I multiply two numbers when they need to be added

Explanation:

By definition, a Logical Error is a coding mistake resulting in the program NOT producing the expected result or behaviour, however the source code is syntactically correct and the program could <em>compile </em>and <em>execute </em>unaware of the error, or result on a <em>crash </em>during <em>runtime</em>.

6 0
3 years ago
Other questions:
  • What computer would be good for editing and streaming for less than 600$?
    7·1 answer
  • Skinner designed a soundproof apparatus, often equipped with a lever or bar, with which he conducted his experiments in operant
    9·1 answer
  • .All of the following are true with the respect to implicitinvocation except:
    8·1 answer
  • 1. Write the syntax of the following HTML commands by using any one attribute
    6·2 answers
  • 2.20 Write an expression involving a three-letter string s that evaluates to a string whose characters are the characters of s i
    6·1 answer
  • Software that is decided to intentionally causing harm to a device, server, or network is 
    13·2 answers
  • Which of the following describes all illustrations created by freehand?
    15·1 answer
  • Discuss why it is important to know the history of social media​
    10·1 answer
  • Why does coinbase keep sending me verification codes
    7·1 answer
  • A(n) _____ is a flexible tool used to analyze data using reports that do not have a predetermined format.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!