1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alborosie
3 years ago
9

Write a program that prompt the user to enter a bank balance. The balance entered by the user is read into a variable named bala

nce. The program then prompts the user to enter the amount to be deposited. The amount entered by the user is read into a variable named deposit. The program that calculates the new balance, which is the present balance plus the deposit. The program then displays the new balance.
Computers and Technology
1 answer:
IRINA_888 [86]3 years ago
4 0

Answer:

ertyuiopoijuhgfdsa hiyoufun tresdfghytrefgytredfg

Explanation:

look for the words

You might be interested in
When a piston has three rings, the bottom ring will be?
mario62 [17]
Asking the Car Gods...

Three Ring: 2 compression Rings and 1 Oil Control Ring
7 0
4 years ago
______________is a collection of technologies for abstracting the details of how applications, storage, network, and other compu
Daniel [21]

Answer:

The correct answer to the following question will be "Cloud computing".

Explanation:

A series of technologies too abstract the specifics of how users are supplied with the software, data, network, and other computing services, called Cloud computing. On-demand, the accessibility of computer resources, database space, and computational complexity, with little or no particular active user administrators.

This term is commonly used to define network infrastructure which is available to several users over the internet.

There are different types of cloud computing. These are as follows:

  • Infrastructure-as-a-Service (IaaS).
  • Software-as-a-Service (SaaS).
  • Platform-as-a-Service (PaaS).

Therefore, Cloud computing is the right answer.

7 0
3 years ago
____________ is/are the information, knowledge of people or things, and connections that help individuals enter preexisting netw
Harlamova29_29 [7]
The social capital is the answer
6 0
3 years ago
Why authentication processes and features important
vladimir2022 [97]

Answer:

<u>Authentication processes</u> are extremely important because they are an extra layer of security. These processes can help keep networks secure by only permitting authorised users to access them. <u>Authentication processes</u> can be used on things such as networks, databases, websites and other network based services/platforms.

Explanation:

3 0
4 years ago
In one to two sentences, describe how you would insert a row in a spreadsheet.
Over [174]

Answer:

give points pls

Explanation:

7 0
4 years ago
Read 2 more answers
Other questions:
  • When a typist changes from a conventional typewriter to a word processor, his typing schema will have to _____ to incorporate th
    12·1 answer
  • Which software application can best help teachers determine their students' average grades?
    5·2 answers
  • Manny has created more than one hundred bookmarks. When he looks at the menu, he has to scroll through a very long list of bookm
    15·1 answer
  • Shania has started a new job as an app developer. Her first task was to make an old app designed for Android available on other
    9·1 answer
  • Do you think cyber-bulling is more damaging, as damaging, or less damaging than in-person bullying? Why?
    11·2 answers
  • ICMP
    12·1 answer
  • What problem is http solving?
    6·1 answer
  • What is the lower House​
    7·1 answer
  • You are having trouble cleaning your computer for a troublesome virus. you decide to try to clean your computer while in safe mo
    5·1 answer
  • The designers of a database typically begin by developing a​ __________ to construct a logical representation of the database be
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!