1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Umnica [9.8K]
3 years ago
14

Consider the following code:

Computers and Technology
2 answers:
Akimi4 [234]3 years ago
5 0

Answer:

integer

Explanation:

when you use randint, it will always come out as integer between 1-100.

lilavasa [31]3 years ago
3 0

Answer:

integer

Explanation:

You might be interested in
Selma writes the following four answers in her Computer Science examination.
REY [17]

Answer:

Interrupts.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

The four (4) input-output (I/O) software layers includes the following;

I. User level software: it provides user programs with a simple user interface to perform input and output functions.

II. Device drivers: it controls the input-output (I/O) devices that are connected to a computer system through a wired or wireless connection.

III. Device-independent OS software: it allows for uniform interfacing and buffering for device drivers.

IV. Interrupt drivers (handlers): it is responsible for handling interruptions that occur while using a software on a computer system.

An interrupt is a signal from a program or device connected to a computer and it's typically designed to instruct the operating system (OS) that an event has occurred and requires an attention such as stopping its current activities or processes.

In conclusion, the computer term that Selma is describing is interrupts.

3 0
2 years ago
Read 2 more answers
Template files can contain the following items: text, tables, images and lists.
TEA [102]

It is true that template files can contain items such as text, tables, images and lists

Explanation:

A template is a pre-designed document file that is formatted within a default layout and is used to help users create new documents such as letters, tables, resumes, presentations, and reports. A resume template, for instance, already contains placeholder text that users can use to replace text information of their own. It would most likely have a blank space for details like your name, address, and contact information. Some programs have templates that are pre-built while others can be created from scratch. Microsoft PowerPoint has design templates that contain visual representation of images as well. These images help achieve document cohesion.

Learn more about templates

brainly.com/question/3137525

#LearnWithBrainly

4 0
3 years ago
Yolanda first breaks down the whole game she needs to program into modules. She then breaks these modules into smaller modules u
Tcecarenko [31]
That’s coo. What’s the question?
5 0
3 years ago
Write a memo to the vice president, outlining the steps an employee might have taken to create an e-mail message and make it app
Natali [406]

Answer:

Following are the memo to the vice president:

Explanation:

In this question, the president claims, that he got a threatening e-mail from the Maui worker. HR acknowledged that all of the workers should always be dismissed, in its protection, that worker claims that he did not send the message but he does not recognize why the message implies him return address. Here is a note for the vice president, who explains how an employee could have produced an email and made it look to be from another worker's account. That stuff we want will be progressively explained as follows:

a) The manipulating and e-mail used only by spammers and attackers were called this technique. In the SMTP server, it sends messages, that you can set up to send your spammer to the email addresses. Instead of a mail confirmation, I d the forger requires the receiver to see the next employee I d email. that recipient doesn't understand who sent the message.

b) The e-mail Systems information allowing for accessible transfer is used by the intruder or forger. It  must use an attacker order to verify communication with the SMTP server command:  

telnet smpt.server.name 25    

Its name of the SMTP server is smpt.domain.name, and the port is 25.

c) when the last stage is successful as well as a link created, this order to imitate an email account only with command can be entered:

MAIL from: Email-id

It creates a problem for the worker that sends the e-mail with the same id

d) Hacker sets the email of the receiver to:  

RCPT to: boss email-id  

It sets the beneficiary as the e-mail above.  

e) By entering an order, you can create the email data:  

DATA It may also adjust the date by using command and Any date we would like to use.  

Date: (date you would like)  

We should settle on the following:  

Subject: (your topic)

f) We press Insert after the topic is written. In this body can then be e-mail forms. It produces the text.  

g) its email forged is forwarded.

3 0
3 years ago
I dont know how to put the negative sigh on my computer
valina [46]
You put the dash on the right side up top ape
8 0
2 years ago
Read 2 more answers
Other questions:
  • Among the web programming languages, css is used to define _____ of the web page
    5·1 answer
  • One main advantage of CD-ROMs is that..
    7·1 answer
  • To paste text with the same formatting as the document in which it is entered, select _____ from the Paste menu. Keep Source For
    12·2 answers
  • What are pixels? A. Objects that are part of a particle system B. Tiny colored dots that make up images and text on a computer s
    9·1 answer
  • PreparedStatement ps = connection.prepareStatement("select firstName, mi, lastName from Student where lastName = ?"; ps.setStrin
    5·1 answer
  • 1. Which of the following statements are true about routers and routing on the Internet. Choose two answers. A. Protocols ensure
    9·2 answers
  • What is one of the first power tools you’ll need as electrician
    15·1 answer
  • The chief intellectual property officer (CIPO) is responsible for collecting, maintaining, and distributing the organization's k
    14·1 answer
  • If 2 people use my code D9R2M on fetch reward and scan receipts I will give brainliest ​
    13·2 answers
  • What is one of the advantages of using an algorithm to solve a puzzle like Kriss-Kross or Sudoku?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!