1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
umka21 [38]
2 years ago
14

PYTHON 3 CODE HS HELP PLZ

Computers and Technology
1 answer:
Tju [1.3M]2 years ago
3 0

Answer:

B

Explanation:

It adds the same number over and over again, 'number' times.

This is number*number, a.k.a. number². (squared)

You might be interested in
You've formatted the first paragraph of a document. What button can you use to apply the formatting from the first paragraph to
Nata [24]
I think the answer is B. format painter 

3 0
3 years ago
When should the sponsor-monitor conduct the most detailed review of the study protocol with the site's study staff?
Likurg_2 [28]

Answer:

Site initiation visit is the correct answer.

Explanation:

Because the SIV is the sponsor-monitor which administers the detailed analysis of the site's study staff by the study protocol and it observes the process of the visite over a while that it take place after the visite of the site section. It also needed to set up the research site to administrates the analysis. So, that's why the following answer is true.

8 0
2 years ago
How would you explain these three security risks (phishing, keylogging, malware) to a family member? What would you say to help
kompoz [17]

Answer:

1. Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

2. Keyloggers are built for the act of keystroke logging — creating records of everything you type on a computer or mobile keyboard. These are used to quietly monitor your computer activity while you use your devices as normal.

3. Malware is intrusive software that is designed to damage and destroy computers and computer systems.

Explanation:

All of these can be used to steal data & passwords

5 0
3 years ago
What does the following code do? Assume list is an array of int values, temp is some previously initialized int value, and c is
erica [24]

Answer:

It counts the number of items in the given list that are less than Description temp:

Explanation:

Following are the description of the loop  

  • In the given question initially, the value of "j" variable is initialized to 0.
  • After that loop will iterate less then the length of the list array.
  • The  if(list[j] < temp) checks the condition if it is true then c++ increment the value by 1  
  • j++ increment the value of "j" by 1.

4 0
3 years ago
The ________ is made up of a series of tabs that organize the various buttons, drop-down lists, and galleries of options by a br
Nina [5.8K]

Answer:

ribbon

Explanation:

Ribbon is the space at the top of the programs like excel and word, where we can find a lot of options to do in our presentations, this ribbon is divided in other categories where we can find specific options like font, number, and styles, this options was implemented from 2007 and is still used today, in addition we can modify and add other components at the ribbon

8 0
3 years ago
Other questions:
  • The equipment that processes data in order to create information is called the _______.
    8·2 answers
  • Is bit stuffing necessary in the control or address field in theHDLC protocol? why?
    13·1 answer
  • 25 POINTS + BRAINLIEST PLS HELPWhere should you put the argument for a command?
    13·1 answer
  • In cell h15 enter a vlookup function to determine the 2018 percentage of total attendance for the city listed in cell h14. Use t
    7·1 answer
  • To hide the ribbon, ______ on any one of the tabs of the ribbon.
    10·1 answer
  • Let’s define a new language called dog-ish. A word is in the lan- guage dog-ish if the word contains the letters ’d’, ’o’, ’g’ a
    6·1 answer
  • The continue statement _________.
    11·1 answer
  • For what reason can security risks never be fully eliminated?​
    7·1 answer
  • Remember that kid who would always ask you for your food, even though he packed his own lunch.
    8·2 answers
  • Use the table on the right to convert from binary to decimal.
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!