1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alchen [17]
3 years ago
14

ONLY ANSWER IF YOU KNOW HOW TO WRITE THIS CODE

Computers and Technology
2 answers:
denis-greek [22]3 years ago
8 0

Answer:

WRITE THIS CODE

WRITE

WRITE

DochEvi [55]3 years ago
7 0

RHE CODE THW CODE WYM 2 WHSHDBDNDJDJDJJRJRD

You might be interested in
Question 3
goldfiish [28.3K]

Answer: Zero is output.

8 0
3 years ago
In Python please:
Sauron [17]

Answer:

import math

angle = float(input('Enter Angle: '))

shadowLength = float5(input('Enter Shadow Length: '))

tree_height = math.tan(angle)*shadowLength

print('Tree Height = {}'.format(tree_height))

Explanation:

From the equation given, the first step is to derive the equation for calculating the Tree Height.

tan(angleElevation) = tree height / shadow length\\\\tree height = tan(angleElevation) * shadow length

In order to calculate the tangent of an angle, the math module has to be imported. math module allows the program to perform advanced math operations.

The program then prompts the user to input values for angle and shadow length.

The inputted values are converted to floats and used in the equation that was derived for Tree height.

Three height is evaluated and the result is printed to the screen

4 0
3 years ago
if a hacker wants to exploit the TCP three-way handshake, what is the most effective way to go about it?
goldfiish [28.3K]

The most effective way to exploit TCP three-way handshake is TCP SYN flood.

  • SYN flood attack is simply a kind of computer attack that begins with 3-way TCP handshake.
  • TCP SYN flood is also called SYN flood and it is a type of distributed Denial of Service (DDoS) attack that uses every part of the normal TCP three-way handshake to eat up resources on the known server and render it non-functional
  • With TCP SYN flood, a hacker can eat up resources of target's computer and makes it unresponsive.

From the above, we can therefore say that the most effective way to exploit TCP three-way handshake is TCP SYN flood.

Learn more from:

brainly.com/question/14739766

7 0
2 years ago
Create a list words = ['is', 'NLP', 'fun', '?']. Use a series of assignment statements (e.g. words[1] = words[2]) and a temporar
Svetlanka [38]

Answer:

words = ['is', 'NLP', 'fun', '?']

tmp = words[1]

words[1] = words[0]

words[0] = tmp

words[3] = '!'

print(words)

Explanation:

- Create the list

- Assign the new values using <em>tmp</em> variable

- Print the result

Since tuples in Python are unchangeable, you cannot transform the list using tuple assignment.

5 0
3 years ago
When you move into a new home or apartment, the first thing on your checklist should be to have the ____________ changed. (5 Let
Lynna [10]

Answer:

When you move into a new home or apartment, the first thing on your checklist should be to have the <u>locks</u> changed

Explanation:

Changing the locks

Given that the way the previous owners of the new home or apartment made use of the locks and the keys are usually not completely known to the new owners, one may never know all those that have a key or a means to gain access into the apartment or home. Therefore, in order to guarantee proper security, it is a good practice to have as one of the first thing on the checklist, the changing of the locks of the entrance doors and windows of the new home or apartment.

5 0
3 years ago
Other questions:
  • What is a critique of the feature detector model of object recognition?​?
    8·1 answer
  • John would like to move from the city into the suburbs and has been saving up a large down payment for a home. Which is the most
    7·1 answer
  • Write a program to generate personalized junk mail. The program takes input both from an input file and from the keyboard.The in
    14·1 answer
  • Tom Daniels, an employee of a telecommunications company, is developing software that would enable customers to activate value-a
    7·1 answer
  • You are sending Secret information to a colleague located at another office. You want to give him some background information an
    15·1 answer
  • Does digital media play a big role in your life?
    13·1 answer
  • Write a small program that takes in two numbers from the user. Using an if statement and an else statement, compare them and tel
    12·1 answer
  • Jill is configuring the AutoArchive feature in Outlook 2016. What is the default setting in relation to when AutoArchive
    8·1 answer
  • The retention of encoded information over time refers to
    14·1 answer
  • How do you delete questions you asked?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!