1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sladkaya [172]
2 years ago
14

1. Write Python code to implement the following:

Computers and Technology
2 answers:
ZanzabumX [31]2 years ago
6 0

Answer: no why huh hmmmmmmm

Explanation:

alex41 [277]2 years ago
6 0

Answer:

1. class Circle(Ellipse): pass 2. Inheritance is the practice of passing on private property, titles, obligations, qualifications, advantages, privileges, and commitments upon the demise of a person. The standards of inheritance contrast among social etc.

Explanation:

You might be interested in
A computer processes data using only 1s and 0s.<br><br> A.True<br><br> B.False
stiks02 [169]
True. That data is called binary
4 0
4 years ago
________ uses shared computing resources instead of having local servers or devices to handle computing applications.
Oksanka [162]

Answer:

cloud computing

Explanation:

3 0
3 years ago
Which of these is not an execution status of a computer program?
777dan777 [17]

A part of a computer program that performs a well-defined task is known as an algorithm<span>. A collection of computer programs, </span>libraries<span> and related </span>data<span> are referred to as </span>software<span>. Computer programs may be categorized along functional lines, such as </span>application software<span> or </span>system software and running

7 0
4 years ago
A startup disk cannot be detected when booting a computer. The disk's pressence is reported by the system firmware, But Windows
olasank [31]

Answer:

Bootrec.exe

Explanation:

The process of turning on a computer system is called booting. When a computer system boots, it runs the post test and loads into memory, the information or program needed to run the operating system, and then locates the operating system from the boot manager record in the disk partitions. When the disk is failed to be recorded, or the boot manager or sector is corrupt or lost, the bootrec.exe command is used in the command prompt to correct these problems.

8 0
3 years ago
Mecanismo que permite conocer si la persona que esta ingresando a un sistema es realmente quien deba y no un intruso
Tems11 [23]

Answer:

Sistemas de autenticación y seguridad de la información.

Explicación:

La seguridad de la información es un mecanismo que permite saber si la persona que está ingresando a un sistema es realmente quien debería y no un intruso. La seguridad de la información básicamente ayuda a prevenir el acceso no autorizado y permite que la única persona autorizada ingrese al sistema. Los sistemas de autenticación son el mecanismo de seguridad que se utiliza para proteger los datos y los sistemas. Estos sistemas de autenticación también ayudan a garantizar que los usuarios sean la persona autorizada o no.

4 0
3 years ago
Other questions:
  • References are usally innocuous because they are the least personal and direct of the four reference types
    5·1 answer
  • Hannah had been a newspaper carrier for four years. Each year she delivered more papers then the year before. The first year she
    13·1 answer
  • ____ software consists of the operating system and utility programs that control a computer system and allow you to use your com
    9·1 answer
  • Select two netiquette guidelines. In a paragraph of no less than 125 words, explain why these guidelines make professional onlin
    9·1 answer
  • What is the difference between operating systems and application software?
    5·1 answer
  • A bug was discovered in Canvas where the website crashes if 2 or more students are writing a discussion post at the same time. I
    10·1 answer
  • adding ______around calculations indicates which calculations should be performed first before following the typical order of op
    6·1 answer
  • What are the characteristics of a good text-based adventure game? In other words, what are some features that should be in the g
    7·1 answer
  • Write a print statement that displays a random integer between 5 and 5000. Assume the random library is imported.
    12·1 answer
  • The final wrap-up after the conflict is resolved is called the __________________________.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!