Answer:
False
Explanation:
Answer:
The answer is false goodluck6
I need help pleaseeeee!!!
Answer:
True
Explanation:
Integrated Services Digital Network (ISDN) is a set of communication standards for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network.
Pleaseee mark me as brainliest
Hope this help <3
4.9 Code Practice: Question 4
Instructions
Write a program that asks the user to enter ten temperatures and then finds the sum. The input temperatures should allow for decimal values.
Sample Run
Enter Temperature: 27.6
Enter Temperature: 29.5
Enter Temperature: 35
Enter Temperature: 45.5
Enter Temperature: 54
Enter Temperature: 64.4
Enter Temperature: 69
Enter Temperature: 68
Enter Temperature: 61.3
Enter Temperature: 50
Sum = 504.3
total = 0
i = 0
while i < 10:
temp = float(input("Enter Temperature: "))
total += temp
i += 1
print("Sum =", str(total))
I hope this helps!
I don't understand how to do these. It's python by the way.
Answer:
Disclaimer: I dont put the Euler, magic word, and another variables, you need to do this
Explanation:
1°
print(eulersNumber[16])
print(eulersNumber[26])
print(eulersNumber[31])
2°
print(magicWords[:3]+magicWords[8:10])
3° I dont know how i can make this
4°
print(a[::-1])
print(b[::-1])
print(c[::-1])
print(x[::-1])
print(y[::-1])
Have a nice day
SOMEONE PLEASE HELP ME I REPOSTED THIS 3 time and no ONE HAD HELPED ME
Answer:
The answer is B
Chris has received an email that was entirely written using capitalization. He needs to paste this text into another document but also ensure that the capitalization is removed.
What should Chris do?
Use the Paste Special function to paste the text without formatting.
Turn the Caps Lock button on the keyboard to the off position.
Use Shift+F3 to change the case of the desired text.
All of the above steps are correct.
Answer: D. all of the above
Explanation:
Answer:
D.) All of the steps above are correct
Explanation:
2. The internet offers a great source of information; however, how are
you going to make sure that these pieces of information are reliable?
Answer:
There are many different ways that you can ensure that the information you gather on the internet is reliable and accurate! One way is to not look at Wikipedia and sites where anyone has the access to edit it at any time. Sites that are .com or .org are usually from a direct and safe source. Stay away from media websites and if you believe something isn't right, do further research.
Explanation:
Hopefully this helps.
What does a network backbone do?
allows data to be delivered more quickly and efficiently
makes data transfer from the cloud more secure
connects different network functions, such as printers and modems
configures random local networks in major cities that make up the Internet
Answer:
configures random local networks in major cities that make up the internet.
Answer:
D
Explanation:
What are 5 different google g-suite tools that you can use to collaborate and communicate with othe
it is google docs like stuff made by google
[Files, for loops, exceptions; 20pt] Using a for loop, write a function called countWord(). It takes 2 parameters: The name of a text file (e.g. gettysburg.txt that is included with this test) and a word to be searched within that file. Your code should return the number of times the given word appears in the file. Capitalization should not matter. Make certain to handle file exceptions gracefully.
def countWord(name, word):
try:
f = open(name, "r")
lst = ([])
w = ""
for x in f.readlines():
w += x.lower()
lst = w.split()
f.close()
return lst.count(word)
except FileNotFoundError:
print("Please create a file or use the name of an existing text file.")
print("Your word appears", countWord("gettysburg.txt", "random"), "time(s)")
The text file I used for testing looks like:
random words
random words
I'm putting random words in here
random
this is random
RaNdOm
I didn't really know what exceptions your professor is looking for so I just used the file not found one. Best of luck.
Which unit of measurement is used to express the capacity of a servo motor?
A. kg/hr
B. kg/m
C. kg/cm
D. kg/km
Answer:
C. kg/cm
Explanation:
I just did it
1. What sort of information should be taken by the human resource before
leaving for foreign employment? Write in brief.
Answer:
DDDDDDDDDDDDDDD
Explanation:
Answer:
Sources of information on foreign job opportunities. Blue, newspapers or professional journals; Red, personal contacts abroad; Green, recruitment websites.
Explanation:
Name any two operating systems you know.
Answer:
software and hardware
How do you halt an infinite loop?
by pressing the Control key and the
key
Answer:c
Explanation:ctrl and c stops a infinite loop
When a customer makes an online hotel booking the database is updated by using
A) table
B) form
C) query
D)report
When a customer makes a booking, the database is updated by using a form.
Forms in a database are necessary for the manipulation and the retrieval of data. It helps with entering, editing as well as displaying data.
The form allows you to add data to the already existent table and it can also help one to view already existent information.
A form can also be used to view information from query. When this is the case, it searches and analyzes data.
Read more at https://brainly.com/question/10308705?referrer=searchResults
Its made up of a small memory chips on a card that can hold data in an electronic format
The chip can allow you to have more data and more pictures so your phone does not become slow and messages and apps and more.
Erin’s classmate said that the program that they were working on is not running properly because the classmate accidentally put in commas where semi-colons should be. What kinds of errors does Erin need to fix?
logic errors
database errors
debugging errors
syntax errors
Answer:
A simple syntax error :)
"A character or string incorrectly placed in a command or instruction that causes a failure in execution."
Good luck! Hope this helped! :D
The kinds of errors does Erin need to fix is a simple syntax error.
What is syntax error?Syntax is a character or string when incorrectly placed in a command or instruction results in failure while executing.
Erin’s classmate said that the program that they were working on is not running properly because the classmate accidentally put in commas where semi-colons should be.
The correct way to remove syntax error is putting colon and semicolon on the right place.
Learn more about syntax error.
https://brainly.com/question/18271225
#SPJ2
what is the meaning of .net in computer
Answer:
.net is a top-level domain, also known as a TLD. Derived from the word network, it was originally developed for companies involved in networking technology. Today .net is one of the most popular domain names used by companies all over the world to launch their business online.
a employee who has intregity is
Answer:
is some one who demonstrates sound moral and ethical principles ,always does the right thing no matter when or who's watching, they can be trusted around the staff and the stakeholders. which means that that person is honest, fair, and dependable
Explanation:
i actually just did a report for a class that i am taking called human resources
i hoped this helped you
What two states do binary numbers represent?
A) Coder and processor
B) Input and output
C) On and off
D) Right and left
Answer:
C
Explanation:
Binary is a base-2 number system that uses two mutually exclusive states to represent information. A binary number is made up of elements called bits where each bit can be in one of the two possible states. Generally, we represent them with the numerals 1 and 0.
Answer:
C
Explanation:
On and off symbolize 0 and 1.
what makes classical music "classical"?
Answer:
Whereas most popular styles are usually written in song form, classical music is noted for its development of highly sophisticated instrumental musical forms, like the concerto, symphony, and sonata. Classical music is also noted for its use of sophisticated vocal/instrumental forms, such as opera.
Answer:
the time period in which it was composed
Explanation:
Create a class called Drive. It should have instance fields miles and gas which are both integers. Another instance field, carType, is a String. The constructor should receive a String which initializes carType. The other two instance fields are both automatically initialized to 1 in the constructor. Create a method called getGas that returns an integer that is the gas data member. The getGas method has no parameters. Write in java. First correct answer will be marked brainliest, i need answer very soon
public class JavaApplication87 {
public static void main(String[] args) {
Drive dr = new Drive("Insert type of car");
System.out.println(dr.carType);
}
}
class Drive{
int miles;
int gas;
String carType;
public Drive(String ct){
carType = ct;
miles = 1;
gas = 1;
}
int getGas(){
return gas;
}
}
I'm pretty sure this is what you're looking for. Best of luck.
CALCULATE THE PERCENTAGE OF FAT CALORIES TO TOTAL CALORIES. I got no idea how to do this in excel ;-;
Answer:
As you have the Fat Cal. in column C and the total calories in Column B, what you have to do is to divide column C by Column B.
For instance, in column E2, put the formula: =C2/B2.
Then drag the formula down so that the other formulas will be;
E3; =C3/B3
E4; =C4/B4
E5: C5/B5
E6: C6/B6
Then after that you go to the Home tab, then to the Number style section and format E2 to E5 to be percentages.
write a paragraph about ICT?
Answer:
ICT (information and communications technology or technologies) is an umbrella term. It includes any communication device or application, such as radio, television, cellular phones, computer and internet, satellite systems and so on. Videoconferencing and distance learning is a very important part of ICT.
If you draw strength from video games, how?
Answer:
I really dont know
Explanation:
Thank u for the pts tho < :)
If you were the manager at a firm which deals with sensitive information of its customers, employees and other stake holders, how would you make sure that information is protected and is altered only by the designated authorized person
Answer:
explanation below
Explanation:
Management controls are some of the techniques and mechanisms that can be put in place to implement security policies – which ensure information and information systems are protected. These controls are not only used by managers but can be exercised by selected users.
These controls must be put in place to cover all forms of information security, physical security and classification of those information.
Social networking is the most popular online activity?
True
False
Answer:
true
Explanation:
please help me I want the answer for the 3rd question
Place the steps in order for placing a section break
Answer:
choose a break option, select breaks, click the layout tab, change the formatting style, and position the cursor
Explanation:
i could be wrong cause i dont know what its about but this is what makes sense to me
Answer:
position the cursor click the layout tab select breaks choose a break option change the formatting style
Explanation:
Just had this question
it is where your cpu (processor) is installed
Answer:
OPTICAL DRIVE
Explanation:
It think
Which are examples of primary sources? Check all that apply.
diary
newspaper article
biography
photograph
speech
Answer:
A, D, E
Explanation:
Diaries, photographs, and speeches are all forms of primary sources, whereas biographies and newspaper articles are written by a secondary source.
Answer:
a,d,e
Explanation: