1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
emmainna [20.7K]
3 years ago
15

2.4 Code Practice: Question 2

Computers and Technology
1 answer:
Romashka-Z-Leto [24]3 years ago
6 0

Answer:

import math

x = float(input("Input a decimal number of your choice: "))

y=int(x)

x=x-y

print(math.fabs(x))

Explanation:

You might be interested in
If you wanted to look up an article from the Chicago Tribune the best place to start would be
anyanavicka [17]
Books,well trusted websites , news.reports , schools library (online and off ) hope this helps.:-)
7 0
3 years ago
Can anyone help? Please.
Shtirlitz [24]
I can’t see it... can you type it out please?
3 0
3 years ago
Read 2 more answers
A (n) _____, similar to a trojan horse, installs monitoring software in addition to the regular software that a user downloads o
galina1969 [7]

Answer:

Spyware

Explanation:

Internet is a type of computer network that allow device communicate with each other world wide. So, it is not the correct option.

Worm: this is a standalone malware computer program that replicates itself in order to spread to other computers. It spreads copies of itself from computer to computer. A worm can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage. The major feature of a worm is ability to replicate on it own. So, it is not the correct option.

Bot: this is a software application that runs automated tasks. So, it is not the correct option.

Middleware: this is software that lies between an operating system and the applications running on it, enabling communication and data management. It provides services to software applications beyond those available from the operating system. So, it is not the correct option.

Spyware: this is the correct answer. Spyware is similar to trojan horse because it hides itself in a system and a user may not know that it exist on the system. Spyware is a form of malware that hides on your device, monitors your activity, and steals sensitive information without knowledge of the user.

5 0
3 years ago
Read 2 more answers
Exercise Instructions 1. Use the SQL Server Management Studio to complete this lab. a. Create a SQL script file named Car_Inspec
s344n2d4d5 [400]

Answer:

Please see the attached file for the

Explanation:

Download pdf
7 0
3 years ago
Why is it a good idea to restate in your own words what you heard someone say? It can reduce the chances of a miscommunication.
s2008m [1.1K]

Answer:

It can reduce the chances of a miscommunication.

Explanation:

Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties.

An effective communication can be defined as an act which involves conveying or disseminating information efficiently and effectively from an individual (sender) to another (recipient) without any redundancy. Thus, effective communication ensures that messages or information are transmitted properly, guarantees a feedback, lacks the use of harsh tones, ensures both parties are well understood, gives room for clarity etc.

Hence, it is a good idea to restate in your own words what you heard someone say because it can reduce the chances of a miscommunication.

This ultimately implies that, the recipient or receiver of a message should endeavor to repeat what he or she heard the sender say, so as to ensure the message was well received and to limit the chances of responding with a wrong feedback i.e miscommunication.

6 0
3 years ago
Other questions:
  • When you see ##### in a cell, you should A. increase the cell width. B. increase the cell height. C. decrease the cell width. D.
    14·1 answer
  • What attack cracks a password or encryption key by trying all possible valid combinations from a defined set of possibilities (a
    12·1 answer
  • If you have machines doing jobs, fewer staff are needed, therefore costs are
    5·2 answers
  • Does anyone know this page for drivers ed?
    9·1 answer
  • software that provides capabilities common across all organizations and industries is known as ________ software.
    15·2 answers
  • Can you tell me what is rast
    5·1 answer
  • How do you get the computer to stop opening randomly
    15·2 answers
  • What type of formula uses data from multiple worksheets
    6·1 answer
  • I need help about computer program. Solve C language code...... please​
    7·1 answer
  • In windows 10, where would you save the template so it is available in the available templates list in backstage view?.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!