You already know how to use lists. What is the index of 5 in the following list?
[2, 3, 5, 1, 6]
O 4
02
O 1
03
can somebody help me with this plzzz, I watched the video but I don’t got it :’(
Answer:
n,
Explanation:
What type of hacker would a company hire to check for vulnerabilities in their web page?
Answer:
a hacker who can infiltrate a highly protected file but cant protect themselves against anime web site ads cant tell if this was a real question if so sorry
Explanation:
what is your favorite coler and what do you like to do and
Answer:
Orange
Explanation:
I like orange because its vibrant.
What does each row represent?
What distinguishes one record from another?
What should you choose as the primary key for
this table?
Answer:
I think this is your answer broski.
Explanation:
Answer:
a..c,,c
Explanation:
drop down on edge
Help! Please?? Am stuck on this
Answer:
Both B and C are correct.
Explanation:
In any case, you want the OR (age ≥ 18) in there, because that makes the expression true for people 18 and up. So that already disqualifies answer D.
The most precise answer is B, since it literally states the requirements.
A is incorrect, because learners can be 1 as well, and the age can be 18 as well, so you need ≥ in stead of >.
C is interestingly also correct. The left hand side of the OR would be true for ages over 16 or 17, but that's OK in this case.
Photographing during the midday can produce which of the following?
More vibrant colors
Harsh shadows
Blurring
All of the above
Answer:
Harsh Shadows
Explanation:
The value in this assignment statement ( age= textbox2.text)
Answer:
Is from property
Explanation:
because the value or your age in this case comes from the answer the user writes in the property (text box)
Using the table to the right, answer the following questions. Values shown in B5, B9, B13, and B17 represent ______. The value shown in B18 ______. ______ allows you to calculate the sum of selected values without duplicating values in the grand total.
Answer:
Values shown in B5, B9, B13, and B17 represent
✔ subtotals.
The value shown in B18
✔ does not include the values of B5, B9, B13, and B17.
✔ The subtotal function
allows you to calculate the sum of selected values without duplicating values in the grand total.
The values shown in B5, B9, B13, and B17 represent subtotals. The value shown in B18 does not include the values of B5, B9, B13, and B17.
What is the SUBTOTAL Function in Excel?The subtotal function allows you to calculate the sum of selected values without duplicating values in the grand total.
The SUBTOTAL function in Excel is known to be a function that gives room to system users to make groups and then carry out any other Excel functions.
Conclusively, the functions such as sum that is used in Subtotal function in Excel can aid users when they are analyzing their data.
Learn more about subtotal function from
https://brainly.com/question/14465957
Tip of advice on brainliest.You can copy and paste the question then search it in the search bar because i can guaranty that someone has asked that question before. and then all you got to do that and you can keep your points. hope this helps! ;)
Answer:
Thx Man i actully didnt think of it before
(Hey do u wanna rp btw (roleplay
Explanation:
When creating a budget you musk track both your budgeted expenses and your blank expenses
Answer:
actual
Explanation:
A budgeted cost refers to expenses for transactions and operations that the company and the management have to make in the future based on forecasts and future goals.
Actual costs refer to costs incurred on actual operations and transactions during the period recently ended.
When creating a budget you must track both your budgeted expenses and your actual expenses.
is this right or not???????????
Answer:
yes you are correct
Explanation:
Would it be easier to divide/fold a rectangular sheet of paper into 6 equal pieces or 7 equal pieces? Explain your answer.
bcr is an out put device true or false
Answer:
Hey mate....
Explanation:
This is ur answer......
TrueHope it helps!
mark me brainliest plz......
Follow me! :)
Answer:
False?
Explanation:
ok im asking a legit question cuz the teacher asked us what our favorite game was and how to play it and also what youve don in it recently .... its homework so help me out
Answer:
Mario Baseball, its where you form a team of your favorite mario characters and play baseball against the other team! Its the best!
Explanation:
Give 5 advantages of using powerpoint?
What is the use of Ellipse Tool in photoshop
what advice can you give to learners to achieve their goals
Answer:
Never give up, take your time, don't get distracted easily, lock your electronics in a box until you finish your work.
Reach for the stars! Always go the extra mile! Never give up!
In a sentence
If you wanted to become a police officer and you had to read boring books and you wanted to give up, but always think "I should always push myself past my limits, If I gave up then how would i know what I could have become?
Trademark
Owned by me
this isn't really a question ,but a random fact about Fnaf William Aton
Springtrap is possessed by a man named William Afton, or known as Purple guy.William Afton murdered 6 children and stuffed them into suits, now the children posses those suits, Gabriel possessed Freddy Fazbear, Jeremy possessed Bonnie, Susie possessed Chica, and Fritz possessed Foxy, their was one more kid that hadn't had an original so she was stuffed into a Golden Freddy suit.
Who used to be known as Fred bear the bear was already possessed by a child named Evan Afton or C.C (The Crying Child).And since the suit was already possessed Evan Afton was forced out of the suit and now possess a shadow version of Golden freddy known as shadow Freddy.
Shadow Freddy (C.C) was a big part of William Aftons death, C.C lead the animatronics to be dismantled by William, but the animatronics saw that as a chance to get revenge and chased him into a springlock suit called Springbonnie, William Afton was then springlocked and died a slow and painful death from metal being forced in his body and loss of blood.
So you Learn/read that Springtrap is William Afton a serial killer who murdered 6 children and died a slow painful death due to springlocks.
So, thank you for your time.
Answer:
oop- welp. that's pretty cool
Explanation:
Answer:
this is a game but good job for doing your research
Explanation:
to gain a deeper understanding of a text, students should
Answer:
Should explain what they learned, be able to explain what is happening in great detail, and if its an informational text, then they should use what they learn and apply it in real life.
Explanation:
Which of the following would be better communicated with an image than with text?
Choose the answer.
the tone of a person's voice
an invitation to a museum opening
the decor at a wedding
the schedule for a conference
Answer:
A decor to a wedding
Explanation:
its bc who would want to know how its described when u could look of how it looks u might be speechless
The wedding's decor would've been best communicated through an image than through prose, and further calculation can be defined as follows:
Humans react and process new info more efficiently than every sort of data. Visual content is processed 60,000 seconds faster by the human brain than text. It is the picture is worth 60,000 words! Moreover, visual data accounts for 90% of the information conveyed to the mind.Therefore, the final choice is "the decor at a wedding ".
Learn more:
brainly.com/question/16390691
What is Qbasic programming language?
Answer:
QBASIC is a high level programming language that allows us to write programs. BASIC uses English like words and mathematical symbols to write programs. The programs written in QBASIC need to be converted into machine codes. QBASIC provides working area to write programs and QBASIC has its own Interpreter
Explanation:
Organisms in a food web are related through producer/consumer, predator/prey, and parasite/host relationships. Because of these relationships, one population affects others through direct and _______ interactions.
Answer:
Indirect.
Explanation:
Pyramid of energy is a model used to depict the flow of energy from one trophic level or feeding level to the next in an ecosystem. It's a diagram that compares the energy used by organisms at each trophic level of the food chain. The pyramid of energy must never be inverted or turned upside down.
The units used in the construction of pyramids of energy is kilocalories (kcal) or energy per area per time (Jm-²year-¹).
Organisms in a food web are related through producer/consumer, predator/prey, and parasite/host relationships. Because of these relationships, one population affects others through direct and indirect interactions. A direct interaction refers to the linear relationship between two organisms such as predator feeding on a prey (a lion eating a deer) while an indirect interaction is a type of relationship that occurs or is mediated through a third.
How can you rotate and resize your drawing?
Answer:
Do one of the following:
To rotate the shape counterclockwise, on the Home tab, in the Arrange group, click Position, point to Rotate Shapes, and select Rotate Left 90º.
To rotate the shape clockwise, on the Home tab, in the Arrange group, click Position, point to Rotate Shapes, and select Rotate Right 90º
Answer:
By using the PICTURE application built into your computer, you can set a custom image editing type. It goes very easily from there
Explanation:
...
Which of the following is a distraction that you find when photographing animals at the zoo?
Fences
Enclosure glass
Other people
All of the above
Answer:
D all of the above
Explanation:
because fences, enclosure glass, and other people are all distracting from the real focus which is the animal.
Please Mark brainliest and give 5 star.
Answer:
All of the above (I did the test and got it right)
Explanation:
the most common threats to your computer and your online safety come from what is called ____
Answer:
VIRUSES
Explanation:
Answer:
A Malware
Explanation:
Help!!!! Arrays 100 points
Answer:
2 weeks ago so i think your doe with the quiz
Explanation:
Answer:
i hate to do this but I'm desperate.
Explanation:
you have no keywords in the question and this was months ago, these points are just going to waste and I need them, sorry & thanks
Amal wants to store a list of the average temperatures for the past month (for example 14.2, 14. 12.6). What data type can he use to store all these values?
A. Floating point number
B. Integer
C. Array
D. String
Answer: the correct answer is C
Explanation: array is 100% correct
I got the question right
In your own words, explain what it means to “buy low, sell high.”
Answer:
Resell value should be high like buying a used car for a low price fixing it a bit and double your money.
Explanation:
Answer:
Exactly what it says
Explanation:
You buy items at a low price then sell them at a higher price to ensure you get a profit
How to design remote access policy using the appropriate access controls for systems,applications, and data access
Answer:
All remote access users connect to the network and maintain all security standards on the device including
Valid and virus protection
Malware protection
Maintain the OS
Explanation:
The remote access policy applies to employees and other affiliates who owned devices to remotely access the Network CCC. The remote policy access connection is used to perform the work activities on the behalf of CCC. Remote access system, application and can be accessed with the internal CCC network. Example of application are as follow:
Internal Academic System
Internal websites
Documents files on internal file
Local colleges resources
Servers
Remote access will be managed by System Data Center and use security measures based on requirements.
Remote access is provided as an extension of the normal work environment.
Review the CCC information technology for protecting information via the remote method.
The employee will use remote procedures. Employees disclose the passwords and if the business is conducted from home.
All remote access includes a "time-out" system. In accordance with CCC and will time out the specified period of inactivity.
The access users accept the access and connection to networks and monitored to record dates, time. Identify accounts and have been compromised by external parties.
The remote access user may be listed in the remote access application.