answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tensa zangetsu [6.8K]
2 years ago
13

35 points please help!

Computers and Technology
1 answer:
Ahat [919]2 years ago
7 0

Answer:

Microsoft Poweroint

Explanation:

this software helps people to present their projects.

You might be interested in
Write a program that calculates an adult's fat-burning heart rate, which is 70% of 220 minus the person's age. Complete fat_burn
Brut [27]

Answer:

def get_age():

age = int(input())

if(age>=18 and age<=75):

return age

else:

raise ValueError("Invalid age.")

def fat_burning_heart_rate(age):

return ((70 / 100) * (220 - age))

if __name__ == '__main__':

try:

age = get_age()

print("Fat burning heart rate for a",age,"year-old:",fat_burning_heart_rate(age),"bpm")

except ValueError as ve:

print(ve.args[0])

print("Could not calculate heart rate info.")

Explanation:

def get_age():

age = int(input())

if(age>=18 and age<=75):

return age

else:

raise ValueError("Invalid age.")

def fat_burning_heart_rate(age):

return ((70 / 100) * (220 - age))

if __name__ == '__main__':

try:

age = get_age()

print("Fat burning heart rate for a",age,"year-old:",fat_burning_heart_rate(age),"bpm")

except ValueError as ve:

print(ve.args[0])

print("Could not calculate heart rate info.")

The above program performs an operation to determine the percentage of fat burning rate.

It takes the value of the ages of some adult as input, performs a series of conditional statement function on them. Before given an output .

Kindly check attachment for output

8 0
2 years ago
Secure Wi-Fi networks and VPNs use _____ to secure data transferred over a network.
Aleksandr-060686 [28]

VPNs and Wifi networks use tunneling to send data privately over a network

4 0
2 years ago
Olivia creates a personal budget. She enters her current savings account balance in cell D3. In cell A3, she calculates her inco
alexdok [17]

Answer is :

=D3+A3-B3

These Cell address contain following statement:

D3= Olivia saving account balance

A3= Olivia 3 month income

B3= Olivia 3 month expense

so, Expense are also deducted from income and income is added into saving balance.

In this situation we are use this formula:

=D3+A3-B3

5 0
2 years ago
Which one of the following is a correct declaration for a method named passAList that has as arguments an array list myList of s
alekssr [168]

Answer:

"public static void passAList(ArrayList<Integer> myList, int[] intArr)", is the correct answer for the above question.

Explanation:

Missing information :

  • The option is missing but the question states "choose from the following". The correct defining syntax is defined above.

Detailed Explantion :

  • The above question asked about syntax which takes the value of list and array as an argument.
  • It is already defined in the above syntax.
  • And the value is passed by the user at the time of function call.
  • The array list is defined by the help of the ArrayList class and the array is defined by the help of the "[]" symbol.

3 0
2 years ago
Your network administrator finds a virus has been successfully inserted into the network software. The virus itself is now consi
Svetlanka [38]

Answer: Vulnerability of

Explanation:

The network administrator was able to identify that virus before it led to denial of service to users. Since it has been discovered, it is no longer a threat as measures will be taken to eliminate it. But a virus that was successful uploaded shows how vulnerable the system is or how bad the security protections put in place are. Steps has to be taken to ensure it does not reoccur.

7 0
2 years ago
Read 2 more answers
Other questions:
  • What helps companies and organizations to target masses of people, provide 24/7 services, and deliver better marketing in a chea
    13·2 answers
  • Rob creates a Course_Details table that has four columns: Course _ID, Course_Name, Semester and Credits. A course may have 0.5 c
    6·2 answers
  • Which statements describe the advantages of using XML?
    12·2 answers
  • Assume that name has been declared suitably for storing names (like "Misha", "Emily" and "Sofia") Write some code that reads a v
    10·1 answer
  • A U.S. social security number consists of a string of 9 digits, such as "444422333". Assume that input consists of a sequence of
    6·2 answers
  • To play game, go inside the Grand Theft Auto V folder and right click and runGTAVLauncher as administrator.If you get any missin
    5·1 answer
  • The PictureBook class is a subclass of the Book class that has one additional attribute: a String variable named illustrator tha
    9·1 answer
  • A(n) ___________________ is a set of characters that the originator of the data uses to encrypt the text and the recipient of th
    10·1 answer
  • Accenture has partnered with a global construction company that specializes in building skyscrapers. The company wants better ma
    12·1 answer
  • You are having a problem with your Windows computer that is isolated to a single graphics editing program that you use every day
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!