1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotegsom [21]
3 years ago
14

Python 3 please hurry!!

Computers and Technology
1 answer:
user100 [1]3 years ago
6 0

Answer:

Explanation:

You might be interested in
Which term describes an event where a person who does not have the required clearance or access caveats comes into possession of
notka56 [123]

Answer:

The answer is "compromise"

Explanation:

In computer science, the comprised system is used to describe as any technological resource, that has been negatively affected by an untrustworthy source for nondisclosure, integrity or accessibility either deliberately or inadvertently.

  • In this, the mechanical interaction from the unauthorized source or technological progress can result in compromise.
  • This helps you and the partner to meet each other's interests by taking into consideration both the positions and the solution to the main problem.

4 0
3 years ago
Read 2 more answers
Can someone please help me! It’s due Thursday!
Eva8 [605]

Answer:

if the input is zero the out put is 1

Explanation:

because if you think about it if the input was 1 the output would be zero

7 0
2 years ago
An argument does not always have to be made in words. A piece of music
mixas84 [53]

Answer:

B. emotional

Explanation:

An emotional argument. An argument does not always have to be made in words.

4 0
3 years ago
Tightly.
Radda [10]

Answer:

AG 6.

AG 1.

AG 3.

AG 4.

AG 7.

AG 5.

AG 2.

Explanation:

Chronology can be defined as an arrangement of data, items or documents in the order in which they occurred or happened (in time), from the earliest to the most recent or latest.

Simply stated, ordered events are organized in order of time and this process is known as chronology.

Generally, a chronology can be used as a filing process in various areas such as schools, hospitals, hotels, and business firms to help put data (informations) in order by time or date.

In Computer networking, a cable can be defined as a wired connector used for connecting and transmitting signals between two or more network devices such as CAT-5, CAT-6 and fiber optic cables. These cables which are either twisted or untwisted pair are to be crimped in order to make them eligible and appropriate for use in connecting network devices.

Furthermore, there are two (2) color codes used for the arrangement of the wires in a network cable based on the type of network connection;

I. For straight-through, host device to a router or switch;

Color code: white-orange, orange, white-green, blue, white-blue, green, white-brown, brown.

II. For cross-over, network device to a network device e.g router or router;

white-green, green, white-orange, blue, white-blue, orange,

5 0
3 years ago
4. How many times will the print statement be executed within the following nested for loops? Briefly explain how or show the ma
HACTEHA [7]

Print statements are used to display outputs

The number of times the nested loop will be executed is 43200

<h3>What are nested for loops?</h3>

Nested for loops are loops that are placed within another loop or loops

From the statement, we have the following loop conditions:

h = 1; h <= 12, m = 0; m <= 59 and s = 0; s <= 59

The above means that:

  • h = 12 --- the outer loop will be executed 12 times
  • m = 60 --- the middle loop will be executed 60 times
  • s = 60 --- the inner loop will be executed 60 times

So, the number of times the nested loop will be executed is:

Count = 12*60 *60

Count = 43200

Hence, the number of times the nested loop will be executed is 43200

Read more about loops at:

brainly.com/question/14284157

8 0
3 years ago
Other questions:
  • Write a program that takes in a line of text as input, and outputs that line of text in reverse. The program repeats, ending whe
    12·1 answer
  • 10 facts about turbines
    11·2 answers
  • What economic measure is at the highest level since the Great Depression?
    12·1 answer
  • Which one of the following is a functional requirement? Select one: a. None of the mentioned b. Robustness c. Maintainability d.
    10·1 answer
  • __________ offers a mechanism to accomplish four security goals: confidentiality, integrity, authentication, and nonrepudiation.
    9·1 answer
  • Create an array named itemDescription containing the following item descriptions:
    15·1 answer
  • Manuel owns a small business. He needs to calculate the amount each employee owes in Federal taxes. Manuel should
    11·2 answers
  • What do you do when you have computer problems? Check all that apply. PLEASE HELP
    9·2 answers
  • Pls help now the question is very hard someone help me pls​
    6·1 answer
  • Which of the following can be termed ‘application software’?​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!