PLEASE HELP I NEED TO CHECK MY ANSWER ASAPPP
8. Based on the following syntax, what is a likely output for this code snippet if "number" was 35.555
return count(amount_owed. 2)
O 35.555
O 35.55
O 36
O 40
Functions are code segments that are executed when called or invoked
The function definition is not given; so, the output of the program cannot be outrightly determined.
However, the following are the possible scenarios.
The program would return 35.55 if the 2 represents the digits after decimal.The program would return 36 if the 2 represents the significant digits.It is unlikely for the program to return (a) 35.555 and (d) 40
Read more about functions at:
https://brainly.com/question/14284563
Write a program that allows the user to enter three separate strings: a city name, a state name, and a ZIP code.
Answer:
In Python:
city = input("Enter a city: ")
state = input("Enter a state: ")
zip_code = input("Enter a zip code: ")
In addition to being fun, another reason that people have been creating games ever since they settled into communities is:
They keep us out of trouble.
They teach us to follow rules.
They teach cooperation.
They teach strategy and critical thinking.
if you want points just keep looking im asking questons liek crazy
Answer:
I am pretty sure it's D. to teach strategy and critical thinking.
Answer:
They teach strategy and critical thinking
Explanation:
I need help with This excel chart. I don't know how to divide all the rows and columns.
In column F, enter formulas that use a function to calculate % Caught with Table (fish caught with Table hook divided by the total number of fish caught).
Format the % Caught with Table values as a percent with one decimal place.
Answer:
sorry I don't know how to do this.Very very sorry.Explain why you do not need expensive equipment to take pictures or record video?
Explanation:
Expensive equipment is not necessary because from a technical perspective as long as the device has a lens and a mic it should be able to take photos and videos.
Answer: No, you don't not need an expensive camera . It may have better quality or worst quality . A phone car record and take pictures. Using a Light Stand Can give you a better lighting and better angle so you don't have to hold it or put it on your table, lap, or desk.
Explanation: A lot of people think you need to own a good camera to take a good photograph. A more expensive camera can help, but certainly is not essential. To answer the question though, it is 'no' – the equipment really doesn't make any difference to the end result, but does affect the process of getting there.
Byeeeeeee Remember to stan BTS , Wear Your Mask, And Drink Water
How can you implement a framework?
Answer:
that's the answer
Explanation:
I hope it helps to you
Convert the binary number 100101 to decimal. Show your solution
why GUI operating system is more popular than CUI operating system these days? discuss
please give me long answer
Answer:
Explanation:GUI operating system is more popular than CUI operating system these days because they support extra devices and multimedia system and also network and internet which CUI doesnot support. In CUI operating system we have to type commands to perform any task in the computer but in GUI operating system we can give vommands to the computer by clicking on icons, menus and buttons which is easier to us.
Hope It helps................Which of these are examples of an access control system? Check all that apply.
OpenID
44:13
OAuth
TACACS+
RADIUS
Expand
10. Question
The examples of an access control system include the following:
C. OAuth
D. TACACS+
E. RADIUS
An access control system can be defined as a security technique that is typically designed and developed to determine whether or not an end user has the minimum requirement, permission and credentials to access (view), or use file and folder resources stored on a computer.
In Cybersecurity, an access control system is mainly used to verify the identity of an individual or electronic device on a computer network, especially through authentication and authorization protocols such as:
OAuth: Open Authorization.TACACS+: Terminal Access Controller Access Control Server.RADIUS: Remote Authentication Dial-In User Service.Read more on access control here: https://brainly.com/question/3521353
Computer viruses and coding books