1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mr_godi [17]
3 years ago
8

Hi question

Computers and Technology
1 answer:
lapo4ka [179]3 years ago
6 0

Answer:

I believe it's 20% I could be wrong just thinking of it many teenagers don't really come out and say anything and are too afraid to tell anyone by possibly being wrong or putting themselves into more danger

You might be interested in
if you are using an administrator account during a software installation and you get prompted by the uac, you should
N76 [4]
  • If you are using an administrator account during software installation and you are prompted by UAC, all you have to do is click continue and finish the installation.This is because processes that require an administrator access token cannot be silently installed when UAC is enabled, the user must explicitly give consent by clicking yes or by providing administrator credentials.

  • Windows Security can be defined as a built-in application available in Windows 10 that provides a user-friendly interface and tools to manage common security features. An example is Microsoft Defender Antivirus, which offers real-time protection for your computer and data against viruses and many other types of malware. With Windows Security, our computers become more secure and the files on the computer.

Learn more about Windows Security here brainly.com/question/14262072

#SPJ1

7 0
2 years ago
Write an expression to print each price in stock_prices. Sample output with inputs: 34.62 76.30 85.05
Lana71 [14]

Answer:

Here is the Python program:

stock_prices = input().split() #to take input and splits it into a list

for price in stock_prices: #iterates through stock_prices

   print("$",price) #prints each value of stock_prices with a dollar sign

Explanation:

The program is well explained in the attached comments. I will explain the logic of the program with the help of an example:

Suppose the user enters the following input as stock_prices values

34.62 76.30 85.05

input() method is used to take input from user

split() method is used to split or break this input string and returns a list of strings as:

['34.62', '76.30', '85.05']    

Now the statement for price in stock_prices: iterates through each item of the list and print("$",price) prints each value of list with a dollar sign on the output screen as:

$ 34.62                                                                                                            

$ 76.30                                                                                                            

$ 85.05    

4 0
4 years ago
Hackers often argue that hacking is for the good of all people because it points out flaws in computer systems. do you agree wit
lutik1710 [3]
 "Hackers" who work for companies to expose security flaws are definitely good, they're helping protect systems, often referred to as "white-hat" hackers. Many companies hire people like these or offer bounties for such people who can find vulnerabilities. One could say that even without permission, people who hack with the intent of demonstrating holes in security or improving a service could be considered good.

However, I don't believe that as firstly, they are breaking the law, and secondly, they are stealing data and invading people's privacy. One might as well break into somebody's house to say their security is bad! 


7 0
3 years ago
1. Bluetooth
Elza [17]

Complete Question:

1. A wireless technology standard for exchanging data over short distances

2. A particular brand of mobile phone/PDA

3. A network that operates over a limited distance, usually for one or a few users

1. Bluetooth

2. PAN

3. Blackberry

Answer:

1. Bluetooth 2. Blackberry . 3. PAN

Explanation:

1. Bluetooth is a wireless technology standard, used in order to exchange data between mobile devices, like smartphones, tablets, headsets, wearables, over short distances in a one-to-one fashion (which means that it is not possible to build a network based in Bluetooth).

2. Blackberry is a brand of mobile phones/PDAs, very popular a decade ago, because it was the first one to allow mobile users to access e-mails and messages from anywhere, at any time.

3. PAN (Personal Area Network) is an ad-hoc network that it is only available for data exchange at a very short distance, within the reach of a person, i.e. a few meters as a maximum.

It is thought to allow someone to interact with his nearest environment (laptop, tablet, PDA) and it can be wireless (like Bluetooth) or wired (via USB cables).

4 0
4 years ago
Return true if the given non-negative number is a multiple of 3 or 5, but not both. Use the % "mod" operator.
Pani-rosa [81]

the following C++ function will return true if the given non - negative number is multiple of 5 or 3 else it will return false.

bool function( int x ){

// variable to check if it is multiple of both or not

int number =0;

if(3%x == 0){

number++;

}

if(5%x == 0){

number++;

}

// Now returning by deciding

if( number <=1)

return true;

else

return false

}

4 0
4 years ago
Other questions:
  • Excel attempts to guess which cells you want to include in the function by looking for ranges that are adjacent to the selected
    13·1 answer
  • An algorithmic function that takes an input message of arbitrary length and returns an output of fixed-length is called a(n) ___
    10·1 answer
  • Computer communications describes a process in which two or more computers or devices transfer ____.
    10·1 answer
  • What does Mishler mean by the foreground-background interaction? How can this affect the photographs, based on the examples in t
    14·2 answers
  • To open computer manger you would
    13·1 answer
  • Your grandmother was an established artist and left you several original paintings after she died. Which of these statements is
    11·1 answer
  • What is the largest positive number one can represent in an eight-bit 2’s complement code? Write your result in binary and decim
    7·1 answer
  • Points! taga pilipinas ba kayo?​
    10·1 answer
  • Create a class called StockTester that has the following fucntionality. a. Create a main method with an ArrayList named dataStoc
    9·1 answer
  • This code --&gt; plt.plot(x,y) is used to draw :
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!