what will be output of this program a. less than 10 b. less than 20 c. less than 30 d. 30 or more

What Will Be Output Of This Program A. Less Than 10 B. Less Than 20 C. Less Than 30 D. 30 Or More

Answers

Answer 1

Answer:

D. 30 or more

Explanation:

The score value is passed in as var, meaning, its value could change. In this instance score started at zero and 30 was added to it. The last condition is the only condition that fits score's value(if that makes sense). So its in fact D.

hope i was able to help ;)


Related Questions

Suppose that the host with IP address 10.0.1.19 sends an IP datagram destined to host 128.119.160.183. The source port is 3324, and the destination port is 80. I. Consider the datagram at step 1, after it has been sent by the host but before it has reached the NATted router. What are the source and destination IP addresses for this datagram

Answers

Answer:

The source and destination IP addresses are 10.0.1.19 and 10.0.1.25

Explanation:

NAT or network address translation is a network protocol is used by private networks to access the internet by assigning or mapping a public IP address to the private addresses.

The host with IP address 10.0.1.19 searches for the actual destination IP address 128.119.160.183 in its private network and when it does not find it, it sends the packet to the default gateway IP address 10.0.1.25, which is where the private IP address is NATted and sent to the destination.

hey yall wanna send me some just ask for my phone #

Answers

Answer:

Send you some what?

Explanation:

the answer is 12

Hellpppp please I need it!

Answers

Answer:

1 you can transfer photos or files from one device to another

2 you can store photos or files so you save space on a device

3 not sure lol

Explanation:

what social media application that affect our day to day activities, and how did it improve our skill

Answers

Answer:

Instagram

it improved persons photoshop skills to put out better quality photos and videos and it can be an outlet for creative persons    

A connection between files that allows data to be transferred from one file to another is a _______________________.

Answers

Answer:

Link

Explanation:

A Link is a term often used in computer application, data, or file management, that allows a user to carry out the operation of transferring data or information from one file to another often referred to as a target.

There are two types of major links, these include Symbolic links and Hard links.

Hence, in this case, A connection between files that allows data to be transferred from one file to another is a LINK

Disregarding any references or pointers in data elements, i.e., the info components, how many null pointers are there in a properly maintained circular linked list that is not empty

Answers

Answer:

There are no null pointers.

Explanation:

Each element in a circular linked list points to exactly one other element, thus closing the loop and making it "circular".

Which IDEs support multiple high-level programming languages? Select all that apply.

Eclipse

Visual Studio

Xcode

Linux​

Answers

Answer:

The correct answer to this question is given below in the explanation section.

Explanation:

This question is about integrated development environments (IDEs) that support multiple high-level programming languages.

All mentioned IDEs such as Eclipse, Visual Studio, and Xcode support multiple high-level programming languages except Linux.

Using Eclipse, you can do Java programming easily and can build Java-based programs, and also you can do android programming in Eclipse while importing required android settings and libraries. Visual Studio is a Microsoft IDE, in which you can build desktop, web, and mobile, and windows phone app easily using high-level programming. Xcode is an integrated development environment for macOS containing a suite of software development tools developed by Apple for developing software for macOS, iPadOS, iOS, watchOS, and tvOS.

While Linux is not an IDEs, it is an open-source operating system based on Linux kernel.

Answer:

Eclipse

Visual Studio

Xcode

Explanation:

which program monitors the computer by looking for known trouble makers as well as suspicious behavior​

Answers

Answer:

i think spyware because spyware can collect almost any type of data, including personal information like internet surfing habits, user logins, and bank or credit account information. Spyware can also interfere with a user's control of a computer by installing additional software or redirecting web browsers.

Explanation:

You just purchased a single license for the latest Microsoft Office Suite. Your friend has asked to borrow the CD, so he can install it on his computer, too.

Is it okay for him to install it?

No; acts of piracy are legal; however, I paid for it. If he wants it, he can pay for it, too.
No; this would be considered piracy, so he should buy his own license.
Yes; I purchased the single license, so I can install it on as many computers as I want.
Yes; this would only be considered piracy if my friend paid me to install it on his computer too.

Answers

Answer:

B

Explanation:

No, this would be piracy. If he would want to install it, he would have to buy it himself.

Hope this helps :D

Based on The given information, No; this would be considered piracy, so he should buy his own license. Thus the correct option is B.

What is the license?

A license is referred to as access rights or permission granted to an individual to operate any activity. This license acts as an approval method. For example, the approval license for driving is a driving license that allows individuals to drive vehicles.

Piracy is the act of producing more duplicates of a piece of software than the license allows for, either for individual use or business purposes, and using those copies for illegal purposes. In the given case, it is explained that 

In the given case, it is explained that you recently bought a single license for the most recent version of the Microsoft Office Suite. To install the CD on his computer as well, your friend has asked to borrow it. He ought to get his own license since doing this would be piracy.

Therefore, option B is appropriate.

Learn more about Piracy, here:

https://brainly.com/question/870393

#SPJ6

Which IDS/IPS detection method uses previously gained connection attributes to match traffic against predetermined profiles

Answers

Answer:

Stateful protocol analysis detection.

Explanation:

IDS and IPS are acronym for intrusion detection system and intrusion prevention system respectively. IDS is a security system which monitors the network traffic and notifies the engineer when there's a malicious activity. IPS is a security system which monitors the network traffic and blocks malicious activity as well as keeping logs.

Generally, the detection methods used by the Intrusion Prevention Systems (IPS) are;

1. Statistical anomaly-based detection.

2. Signature-based detection.

3. Stateful protocol analysis detection.

Stateful protocol analysis detection is an IDS/IPS detection method that uses previously gained connection attributes to match traffic against predetermined profiles.

Basically, these predetermined profiles comprises of benign activities and suspicious activities that have been developed by industry leaders and vendors as abnormal systems or network behaviors.

A company wants to transmit data over the telephone, but they are concerned that their phones may be tapped. All of their data is transmitted as four-digits. They have asked you to write a program that will encrypt their data so that it may be transmitted more securely. Your program should read a four-digit integer and encrypt it as follows: 1. Replace each digit by (the sum of that digit and 3) modulus 10. Then 2. Swap the first digit with the third, and swap the second digit with the fourth. 3. Print the encrypted integer.

Answers

Answer:

def encrypt_digit(digit):

   if type(digit) is int or float:

       digit = str(digit)

   hold = list()

   for x in digit:

       d = str((int(x) + 3)%10)

       hold.append(d)

   first = hold.pop(0)

   second = hold.pop(0)

   third = hold.pop(0)

   fourth = hold.pop()

   print(int("".join([third,fourth, first, second])))

encrypt_digit(7836)

Explanation:

The python function accepts a four-digit parameter which represents the data transmitted over the company's telephone network. The function encrypts the data by adding 3 to each digit and getting the modulus of division 10, then the digits are swapped and printed out encrypted and ready for transmission.

Encryption are used to protect data and files when they are is being transmitted

The encryption program written in Python, where comments are used to explain each line is as follows:

#This gets input for the number

num = int(input())

#This converts the number to string

digit = str(num)

#This creates a list

myList = list()

#This encrypts the number, and add the numbers to a list

for i in digit:

   d = str((int(i) + 3)%10)

   myList.append(d)

#This prints the result of the encryption

print(int("".join([myList[2],myList[3], myList[0], myList[1]])))

Read more about encryption at:

https://brainly.com/question/14298787

Advantages of database​

Answers

Answer:

Reducing Data Redundancy. The file based data management systems contained multiple files that were stored in many different locations in a system or even across multiple systems.

Sharing of Data.

Data Integrity.

Data Security.

Privacy.

Backup and Recovery.

Data Consistency

Explanation:

Answer:

Reducing Data Redundancy. The file based data management systems contained multiple files that were stored in many different locations in a system or even across multiple systems. ...

Sharing of Data. ...

Data Integrity. ...

Data Security. ...

Privacy. ...

Backup and Recovery. ...

Data Consistency.

descriptive paragraph about a forest beside a lake

Answers

Luscious green leaves of the forest blew in the lukewarm winds of the day. The crystal waters of the lake just beside me reflected the forest in all its glory. The lake feel frigid, but the forest made me feel warm again. A sight to see, and a wonderful place to be was that gorgeous forest by the lake.

Camera work is at the center of video production. True or False?

Answers

Answer:

true i hope it helps

Explanation:ヾ(≧▽≦*)o

Select the statement which most accurately describes the benefits and drawbacks of working from home and telecommuting.

A) Workers can become more effective office managers but may make communication difficult.
B) Workers can work longer days than office workers but may set their own hours.
C) Workers can develop serious health issues but may eliminate their commutes.
D) Workers can collaborate over long distances but may become isolated.

Answers

Answer:

A one

Explanation:

A because workers may get hesitated in front of everyone but at home they will feel free

Answer:

Its probably D

Explanation:

It ask for a benefit and a drawback and the first one just does not make since but tell me if I'm wrong

the term technology is derived from the Chinese word. it is true or false​

Answers

Answer:

True

Explanation:

it's your perfect answers

Yes it is true
Its true

Read the following statements and select the
conditional statements. Check all that apply.
If my car starts, I can drive to work
It is inconvenient when the car does not start.
If my car does not start, I will ride the bus to
work
I purchased this car used, and it is not
reliable

Answers

if my car starts, i can drive to work

if my car does not start, i will ride the bus to work

Answer:

if my car does not start, i will ride the bus to work

if my car starts, i can drive to work

Explanation:

Its a java question and its so urget... thank you...

Answers

Answer:

ghv...................

develop an algorithm to compute and print out the average of 3 numbers A,B,C​

Answers

Answer:

Input: Take 3 numbers A, B and C

Processing: Find average of 3 numbers using formula: Average= A+B+C/3

Output: The output is Average of three numbers.

Explanation:

We need to write an algorithm to compute and print out the average of 3 numbers A,B,C​

An algorithm has Input, Processing and Output

The algorithm required is:

Input: Take 3 numbers A, B and C

Processing: Find average of 3 numbers using formula: Average= A+B+C/3

Output: The output is Average of three numbers.

Device A is attempting send data over the internet to device E which of the following is true of how the data will travel through the network

Answers

Answer:

so, if its a multiple question its better to give us the choices, but I know the info would go to a server and then the server would transport the info to the other computer.

Explanation:

Select the correct navigational path to create the function syntax to use the IF function.

Click the Formula tab on the ribbon and look in the
gallery.

Select the range of cells.

Then, begin the formula with the
, click
, and click OK.

Add the arguments into the boxes for Logical Test, Value_if_True, and Value_if_False.

Answers

Answer:

wewewewewewe

Explanation:

wewe[tex]\neq \neq \neq \neq \neq \neq \neq \\[/tex]

Answer:

1. Logical

2.=

3.IF

Explanation:

JUST TOOK TEST GOOD LUCK!!!

Which Tab provides the command to add a hyperlink to a document?

Answers

Answer:

I love it is your responsibility is accepted the second one was for the database reply to your account we should wear the same same Dp xd I have tow bar is the only one hour u

Answer: The answer is Insert

Explanation:

What is the maximum throughput of a homogeneous pipeline in which four processors each handle one million instructions per second and processing a data item requires 50, 60, 40, and 30 instructions, respectively?

Answers

Explanation:

The maximum throughput is equal to the maximum number of data items processed per second cumulatively by all 4 processors.

Now, for a processor, the maximum data items processed per second

= (Number of instructions per second) / (Number of instructions per data item)

Thus, maximum data items processed per second for

processor 1 :

= (1,000,000) / (50)

= 20,000

processor 2 :

= (1,000,000) / (60)

= 16,666,67

processor 3 :

= (1,000,000) / (40)

= 25,000

processor 1 :

= (1,000,000) / (30)

= 33,333.33

Thus, cumulative throughput

= 20,000 + 16,666.67 + 25,000 + 33,333.33

= 95,000 data items per second

Identify at least three different tools or commands that can be used to determine the ports open on a computer. Explain what can be identified by these tools or commands and what can be done to protect against exploitation from these tools or commands.

Answers

Answer:

COMPUTERkdkwenfjknwejfkjbNT at G--

Explanation:

what is soft copy output device?​

Answers

Answer:

A display device is the most common form of output device. It presents output visually on computer screen. The output appears temporarily on the screen and can easily altered or erased, it is sometimes referred to as soft copy also.

Explanation:

got it from googleeee

100 points and brainlist....................................................................................................................................................................................................................... It Takes a Village! In every business, it takes more than one person to create success - whether you are talking about a berry farm, a historic theater, a popular amusement park, or an expanding coffee chain. While you watch the videos, notice how many different people work together to support and sustain these operations. Cogdell Berry Farm Fox Theatre Six Flags Jittery Joes Now, let's put it all together by creating a presentation entitled "It Takes a Village." Your presentation could either be a word document, a digital mind map, or a slideshow, but it must include a chart and research paragraph for each company. In your presentation, you should create a visual chart or slideshow featuring each company and highlighting at least two different jobs that are needed to keep each company running. Make it clear that each company is comprised of many different positions and discuss how people with different skills and interests work together to contribute to a successful enterprise. Finally, pick out one career from each video and do some additional research on it. Let's consult our handy reference, the Bureau of Labor Statistics' Occupational Outlook Handbook once again to find more information. This time check out the headings 'How to Become One,' 'Pay,' and 'Job Outlook' for each career you choose. Your presentation should include the following content: A chart/slideshow that describes each of the four companies with at least two jobs discussed in each company. In depth research on one job per company, including: How to Become One Pay Job Outlook However you choose to arrange your presentation, make sure to show clearly that the companies you learned about rely on more than one position to keep things running smoothly.

Answers

Answer:  what do i need to do Im confused I will edit my answer to answer correctly to help you Have a Nice day and that was a very nice trick

Explanation:

Answer:

give them brainliest :)

Explanation:

Discuss ISG. Discuss how ISG moves information security beyond technical decisions and makes security a strategic decision. How and why does ISG move information security from the technical arena to the business arena. Discuss why this is necessary.

Answers

Answer:

ISG (Information Security Governance) refers to the engagement of executive management in the issues surrounding how Information Security matters, assets, and risks are directed and managed.

ISG is the high-level involvement that a business entity introduces to achieve the correct information structure, leadership, and guidance, which help it to analyze and mitigate information security risks.

2. ISG moves information security from the technical arena or specialists to the business front burner by ensuring the involvement of those responsible for corporate governance (i.e. board-level management) in the security of an entity's information infrastructure.

3. It becomes necessary to have the board's involvement in order to create senior management awareness and secure their support in efforts to implement policies and processes for the security of information assets.

Explanation:

Generally, corporate governance consists of the set of policies and internal controls by which organizations are directed and managed. Information security governance should be a subset of an organization's overall governance program, which analyzes the risk management, reporting, and  accountability responsibilities of senior management in solving information security challenges.

What are the missing words in the program?
divide(numA,numB):
numA/numB

Answers

If you just want to get the quotient of numA and numB from the function, it would look like this:

def divide(numA, numB):

   return numA/numB

If you want to get the quotient of numA and numB from the function and then print that value to the screen, it would look like this:

def divide(numA, numB):

   return numA/numB

print(divide(1,1))

You can replace those 1's with any number you want.

The missing words in the program are:

def divide(numA, numB):

  return numA/numB

If you want to get the quotient of numA and numB from the function and then print that value to the screen, it would look like this:

def divide(numA, numB):

  return numA/numB

print(divide(1,1))

What is program?

A computer program is a sequence or collection of instructions written in a programming language and executed by a computer. Software contains computer programs as well as documentation and other intangible components. Source code refers to a computer program in its human-readable form. Because computers can only execute native machine instructions, source code requires the execution of another computer program. As a result, using the language's compiler, source code can be converted to machine instructions. The resulting file is referred to as an executable. Source code may also be executed within the language's interpreter. If the executable is called, the operating system loads it into memory and starts a process.

To learn more about program
https://brainly.com/question/22654163

#SPJ2

what are the names of different types of tablets

Answers

Answer:

iPad

IPad mini

IPad Pro

IPad air

Samsung Galaxy tab

Galaxy Tab e

galaxy tab pro

Galaxy tab 2

Explanation:

Also maybe could you look at my 3 biology questions i really need help

If you pay a subscription fee to use an application via the internet rather than purchasing the software outright, the app is called a/an -- application.

Answers

Answer:

Software as a Service (SaaS)

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

Cloud computing comprises of three (3) service models and these are;

1. Platform as a Service (PaaS).

2. Infrastructure as a Service (IaaS).

3. Software as a Service (SaaS).

Software as a Service (SaaS) can be defined as a cloud computing delivery model which involves the process of making licensed softwares available over the internet for end users on a subscription basis through a third-party or by centrally hosting it.

Hence, Software as a Service (SaaS) is an example of a cloud computing environment that provides users with a web based email service. Therefore, if you pay a subscription fee to use an application via the internet rather than purchasing the software outright, the app is called a Software as a Service (SaaS) application.

Some examples of SaaS applications are Salesforce, Google apps, Bigcommerce, Dropbox, Slack etc.

Other Questions
plz help due today giving brainliest! help please 6th grade math foolish answers will be reported i will give brainliest Can anyone please help FAST! Im looking for the correct answer and how you explain it! Ill mark brainlist please and thank you! 50 POINTS! ONLY ANSWER IF KNOW! PLEASE HELP! CAPTURE BELOW plz help me it due 7:10 How would the calculated concentration of the hci be affected if the sodium hydroxide were poured from ma beaker that contained some water before the naoh were added to it Write the equation of the line that goes through (-2, 0) and (4,3).A.) y=-1/2xB.) y=1/2x+1C.) y=2x+1D.) y=x+1/2 A. B. C. Or d. Please Find the slope and the yintercept of the line in the graph. What is the best description of the relation in Item 2?O Aa function that is one-to-one0.a function that is many-to-oneoC.a function that is one-to-manyOD.a relation that is not a functionHelp me please What types of jobs could you do if you lived in portland? Nika baked three loaves of zucchini bread. Each loaf needed StartFraction 17 over 4 EndFraction cups of flour. Which expression shows the best estimate of the number of cups of flour that Nika used? RELATIONSHIP HELP PLEASE HELP ASAP!!!!!!!!!!!!!!!!!!!!!"A reason HAS to be something you have NOT told me before only to prove it to be a lie repeatedly!" I NEED A REASON FOR HIM TO TRUST ME AFTER I CHEATED, LIED, AND MADE HIS ILLNESS WORSE... PLEASE HELP! A hospital claims the main number of patients seen in the emergency room each day is more than 49. You know the following items about this study; The P value is 0.0922, the level of significance is 10% and assume the population is normally distributed Winston deposited $3,294 in a bank account with an annual interest rate of 2.6%. How much interest was earned in 5years? Round your answer to two decimal places. please help meDirections: First, choose and highlight your argumentative topic. Then, conduct research using reliable sources to complete the graphic organizer. Next, synthesize your information into an essay. Keep track of your sources by listing them alphabetically under Works Cited. Submit this entire completed document to dropbox 1.16. Argumentative Topics- Choose ONE by Wednesday, August 261. Year-Round SchoolingSome schools across the nation have implemented year-round schooling, which means 45 days on, followed by 15 days off, then repeat. Do you think our school should switch to year-round schooling? Why or why not?2. Online Learning Some experts say online learning is better than brick and mortar school. Do you believe this a true claim? Why or why not? 1.16 Argumentative Essay Graphic OrganizerTopic: Introduction: Due Thursday, August 27Hook (question, quote, or fact):Topic:Counterclaim:Thesis with claim:Body Paragraph 1: Due Friday, August 28Reason 1:Evidence:Source:Why this is important/how this supports the thesis:Body Paragraph 2: Due Monday, August 31Reason 2:Evidence:Source:Why this is important/how this supports the thesis:Body Paragraph 3: Due Tuesday, September 1Reason 3:Evidence:Source:Why this is important/how this supports the thesis:Conclusion: Due Wednesday, September 2Restate claim:Restate counterclaim and why it is wrong:Summarize reasons and evidence:Strong concluding sentence summarizing thesis: 1.16 Argumentative Essay Copy the information from your graphic organizer into an organized five-paragraph essay below. (Each section from the graphic organizer will be a paragraph). Works Cited Copy and paste the websites where you found your information in alphabetical order below. What's 6+2x^2 in factored form? Hey guysWhat is ionic bond and how do we get it???Please quik helpp Equipment which cost $446,000 and had accumulated depreciation of $248,000 was sold for $222,000. This transaction should be shown on the statement of cash flows (indirect method) as a(n):_________ Marisol attempted to determine the slope of a line based on the two points shown in the table below.xy14310Step 1: (1, 4) and (3, 10)Step 2: StartFraction 10 minus 3 Over 4 minus (negative 1) EndFractionStep 3: StartFraction 7 Over 5 EndFractionWhich statement best explains Marisols error?