Tatiana has a hearing difference and has received a video from her friend through email. To understand what is said in the video, Tatiana can use:

A) a large print keyboard
B) a trackball
C) closed captioning
D) text to speech


PLEASE HURRY RUNNING OUT OF TIME!!

Answers

Answer 1
C) Closed Captioning

It can’t be A because that does not affect her hearing.

It can’t be B because it is unrelated to the prompt.

It can’t be D because there is not text!

Hope this helps ;)

Related Questions

the role that is responsible for developing overall policies and procedures for database security is:

Answers

Note that the role that is responsible for developing overall policies and procedures for database security is: "Database Administration" (Option B)

What is the importance of Database Security?

Data is a precious asset that each firm creates, acquires, stores, and exchanges. Protecting it from internal or external corruption and unauthorized access protects a firm from financial loss, reputational injury, deterioration of consumer confidence, and brand erosion.

Database security refers to the many steps that businesses take to secure their databases from both internal and external threats. Database security entails safeguarding the database, the data contained inside it, the database management system, and the different applications that utilize it.

Learn mroe about Database Administration:
https://brainly.com/question/28271738
#SPJ1

Full Question:

The role that is responsible for developing overall policies and procedures for database security is:

A) Data Administration.

B) Database Administration.

C) Database Development.

D) Accounting

the trim function removes all spaces in a text string except for the single spaces between words. t or f

Answers

Answer: The answer is true

Explanation: Hope this was helpful

Answer:

the answer is true

Explanation:

hope this was helpful

Which characteristics differentiate a solid state drive (ssd) from a hard disk drive (hdd)? select all that apply.

Answers

The characteristics that differentiate a solid state drive (ssd) from a hard disk drive (hdd) is option B and C:

Smaller form factorNon-moving parts

What is SSD about?

SSDs employ more recent technology that saves data on memory chips that are readily accessible. SSDs are more dependable, faster, quieter, smaller, and use less energy. HDDs are more affordable, offer greater storage space, and make data recovery from damage simpler.

Therefore, in terms of smaller form factor; SSDs use non-volatile memory in addition to having no moving parts and a tiny form factor and in terms of non-moving components; SSDs are smaller, use non-volatile memory, and contain no moving parts.

Learn more about solid state drive from

https://brainly.com/question/28346495

#SPJ1

See full question below

What characteristics distinguish a Solid State Drive from a Hard Disk Drive? Check all that apply.

High RPMs

Smaller form factor

Non-moving parts

Uses Disk Platters

Assignment 4 divisible by three
I need a little help. I do not understand what I am doing wrong. I keep getting this message in the picture included.

n = int(input("How many numbers do you need to check? "))

divisible = 0

notdivisible = 0

for x in range(n):

num = int(input("Enter number: "))

if num % 3== 0:

divisible += 1

print(str(num)+" is divisible by 3.")

else:
num % 3== 0

notdivisible += 1

print(str(num)+" is not divisible by 3.")

print("You entered "+str(divisible )+" number(s) that are divisible by 3.")

print("You entered "+str(notdivisible )+" number(s) that are not divisible by 3.")



n = int(input("How many numbers do you need to check? "))

divisible = 0

notdivisible = 0

for x in range(n):

num = int(input("Enter number: "))

if num % 3== 0:

divisible += 1

print(str(num)+" is divisible by 3.")

else:
num % 3== 0

notdivisible += 1

print(str(num)+" is not divisible by 3.")

print("You entered "+str(divisible )+" number(s) that are divisible by 3.")

print("You entered "+str(notdivisible )+" number(s) that are not divisible by 3.")

Answers

Answer:

I'm not sure if this is the problem, but you do else: num % 3 == 0. I don't think this should be here. In the else case, it is not divisible by 3, so you only need to add 1 to the notdivisible variable.

Explanation:

The issue is with the line num % 3 == 0 in the else statement. This is a comparison expression that evaluates to either True or False and does not change the value of notdivisible.

What is programming?

Computer programming is the process of carrying out a specific computation, typically by designing and constructing an executable computer programme.

Here's the corrected code:

n = int(input("How many numbers do you need to check? "))

divisible = 0

notdivisible = 0

for x in range(n):

   num = int(input("Enter number: "))

   if num % 3 == 0:

       divisible += 1

       print(str(num) + " is divisible by 3.")

   else:

       notdivisible += 1

       print(str(num) + " is not divisible by 3.")

print("You entered " + str(divisible) + " number(s) that are divisible by 3.")

print("You entered " + str(notdivisible) + " number(s) that are not divisible by 3.")

Thus, this code should correctly count the numbers that are divisible and not divisible by 3.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ2

ou are preparing to graduate with a degree in photography, and being the extremely organized person that you are, you want to outline the various job options that you could pursue post-graduation. What might this list look like and include? Identify at least five popular types of photography, what they entail, and why they might appeal to you.
As with most professions, photography comes with its own unique set of terms and jargon. Identify at least four different words related to photography, define, and use them in a sentence that expresses their meaning in relation to the field.
Next week, you are managing your first big photography shoot, a Back-to-School shoot for a large company’s website. While excited, you are feeling a bit overwhelmed. In order to calm your nerves and help yourself prepare, you have decided to outline your workflow for the shoot, identifying what your main goals are for each stage of production and which speed and efficiency concepts you will utilize. Share what your outline would include.
Consider the various ways that you communicate on a daily basis with those around you. How do these compare to the types of communication that you anticipate needing to use while working as a photographer? Compare and contrast the types of communication you use in your current life with the types of communication you will use as a photographer, including how verbal and nonverbal communication, as well as memos and other paperwork, might play a role.
You work as a personal assistant for a very high-profile fashion photographer. She has given you her credit card and asked you to equip one of her new studios with every piece of equipment, tool, and accessory that she might need to properly perform her job as a fashion photographer. What should you buy? Discuss why would you choose these items and what they do.

Answers

The five popular types of photography are:

Landscape Photography - It captures natural environment and is usually shot in a shot in a horizontal orientation.Wildlife Photography - it captures wildlife in their natural environment.Aerial photography -  This is taken from the air.Sports / Action Photography - This involves capturing objects or individuals in motion.Portrait Photography -  This involves capturing people and their personalities.

What is photography?

The word "photography," which comes from the Greek words "photo," which means light, and "graph," which means to draw, literally means "drawing with light." Photography is the process of capturing an image, or a photograph, on a digital electronic or magnetic memory, or on a piece of light-sensitive film.

Everybody's life is greatly influenced by photographs because they help us remember our past and remind us of specific people, places, emotions, and events. They can aid in defining who we are. Many people can be moved by photography, which may result in positive change.

Learn more about photography on:

https://brainly.com/question/27345579

#SPJ1

What type of cloud infrastructure delivers services based on security requirements, the mission-critical nature of the applications, and other company-established policies that supports organizations that want to maintain higher security standards for some data but have less-sensitive data that does not require intranet-level protection?.

Answers

A type of cloud infrastructure that delivers services based on security requirements, the mission-critical nature of the applications, and other company-established policies that supports organizations that want to maintain higher security standards for some data but have less-sensitive data that does not require intranet-level protection is: 1) Public cloud.

What are the types of cloud computing?

In Computer technology, there are four (4) main types of cloud deployment model and these include the following:

Private cloudHybrid cloudCommunity cloudPublic cloud

What is a public cloud?

In Cloud computing, a public cloud can be defined as a type of cloud computing service which avails a service provider (business organization) an opportunity or ability to own and manage a well-secured and functional cloud infrastructure for its client organizations.

Read more on public cloud here: https://brainly.com/question/29745873

#SPJ1

Complete Question:

What type of cloud infrastructure delivers services based on security requirements, the mission-critical nature of the applications, and other company-established policies that supports organizations that want to maintain higher security standards for some data but have less-sensitive data that does not require intranet-level protection?

1) Public cloud 2) Hybrid cloud 3) Virtualized cloud 4) Private cloud

the act of attempting to acquire information such as user names, passwords, and credit card details by acting as a trustworthy entity in an electronic communication is called

Answers

The act of attempting to acquire information such as user names, passwords, and credit card details by acting as a trustworthy entity in an electronic communication is called phishing.

What are the types of social engineering attacks?

Generally speaking, cyber attacks often require long periods of planning and intelligence gathering to lay the groundwork. Also, some examples of social engineering attacks include the following:

VishingBaitingTailgatingWater-holingSpear phishingPretextingPhishingQuid pro quo

What is phishing?

In Computer technology, phishing can be defined as a type of cyber attack (social engineering) which involves making an attempt to obtain sensitive user information such as a password, especially by disguising as a trustworthy entity in an electronic communication (email), and usually over the Internet.

In conclusion, a training on phishing attacks is a topic that would benefit many employees and end users.

Read more on phishing here: brainly.com/question/23850673

#SPJ1

Using while loop, write a C++ program that will compute and display the square roots of the first 25 odd positive integers starting from 1.

Answers

#include <iostream>

#include <cmath>

int main() {

 int i = 1; // initialize counter to 1

 while (i <= 25) { // loop until counter reaches 25

   std::cout << "The square root of " << i << " is " << sqrt(i) << std::endl;

   i += 2; // increment counter by 2 to get the next odd number

 }

 return 0;

}

true or false: on-site seo deals with the formatting of content on the website to maximize its chances of ranking for all desired searches.

Answers

On-site SEO deals with the formatting of content on the website to maximize its chances of ranking for all desired searches: True.

What is Search engine optimization (SEO)?

Search engine optimization (SEO) can be defined as a strategic process which is typically used to improve and maximize the quantity and quality of the number of visitors (website traffics) that visits a particular website, by making it appear topmost among the list of results displayed by a search engine such as the following;

BingGoo-gleYah-oo

This ultimately implies that, search engine optimization (SEO) can help individuals and business organizations to maximize the amount of traffic that is generated by their website, through the strategic formatting of content on the website and placement at the top of the results returned by a search engine.

Read more on search engine here: brainly.com/question/27965856

#SPJ1

(576)8. In to ( )16 ( )8

Answers

Answer:

around ()72381 approx

Explanation:

approximately not accurate

which online note-taking tool allows students to post notes to their desktop for visual cues? web clipping tools electronic flash cards electronic sticky notes online data storage sites

Answers

Electronic Sticky Notes is the online note-taking tool allows students to post notes to their desktop for visual cues.

What is Sticky Notes?Sticky Notes are an electronic counterpart of a 3M Post-itTM, a little, colorful piece of paper (usually yellow) that clings to nearly anything. Sticky Notes was originally launched in Microsoft Windows with Windows 7 which allows users to have electronic reminders put on their screen.In Windows 10, go to the Start menu and enter “Sticky Notes.” Sticky Notes will reopen from where you last left them is an additional feature in this windows.. To open a note, tap or double-click it in the list of notes. To start a new note, use Ctrl+N shortcut  on the keyboard.

To learn more about electric Sticky Notes visit https://brainly.com/question/2701755

#SPJ4

Which type of programming language translates the entire code before running any of the instructions/steps?.

Answers

A compiled programming language is a type of programming language that translates the entire code into machine code before running any of the instructions or steps. This machine code can then be executed by the computer directly, without the need for a separate compiler to be run each time the code is executed.

In contrast, an interpreted programming language translates the code into machine code at runtime, meaning that the instructions are executed by the computer as they are encountered in the code. This can make interpreted languages slower than compiled languages, but it also allows for more flexibility and can make it easier to debug and modify the code.

Examples of compiled programming languages include C, C++, and Rust, while examples of interpreted programming languages include Python, JavaScript, and PHP.

For which of the four game elements will you give a detailed description about the challenges that the player will face, such as explaining whether the challenges are people or objects, or both, and describing special obstacles that randomly appear at various levels of the game?

A.
operation

B.
obstacles

C.
outcome

D.
objective

Answers

The four game elements that will give you  a detailed description about the challenges that the player will face is option D: objective.

What goals does game development have?

To bring about creativity and originality in task completion and issue solving. to prepare pupils for group collaboration.

Note that giving the player a clear objective gives them something to aim for. Make sure the player can relate to this motivation.

Therefore, The most crucial component of a game can be its objectives, which determine how the game is won or lost, what the player is instructed to perform in-game, and what the player must do to gain optional Achievements.

Learn more about objective from

https://brainly.com/question/18516671
#SPJ1

What is the default sprite provided by Scratch?

A.
dog

B.
cat

C.
frog

D.
bird

Answers

The answer is cat if you listen


1. Explain how the trend to digital affects jobs in the audio and video production industry.

Answers

Answer& Explanation:

The trend toward digital technology has had a significant impact on jobs in the audio and video production industry. Digital technology has made it easier and more affordable for individuals and companies to create their own audio and video content, which has led to an increase in competition in the industry. This has made it more difficult for professionals in the field to find work, and it has also put pressure on companies to reduce their costs by hiring lower-paid workers or outsourcing work to other countries.

Additionally, the rise of digital technology has led to changes in the way that audio and video content is produced, distributed, and consumed. Many traditional production roles, such as film editors and sound engineers, have been replaced or supplemented by digital tools and techniques. This has led to a need for professionals with different skills and expertise, such as knowledge of digital audio and video software and experience with online platforms and distribution channels.

Overall, the trend toward digital technology has had a major impact on the audio and video production industry, and it has changed the types of jobs and skills that are in demand in the field.

major, large city newspaper endorsements often carry important weight, especially in down ballot races for local offices.

Answers

True- major, large city newspaper endorsements often carry important weight, especially in down ballot races for local offices.

What is endorsement?

Endorsements are a type of advertising that makes use of well-known figures or celebrities that enjoy a high level of public awareness, respect, and/or recognition. These persons serve as brand ambassadors by using their names or likenesses to advertise a good or service. An endorsement, in a broader sense, is an expression of agreement with or support for something or someone; the endorser may or may not get payment. A blank endorsement is one on which the endorser merely signs his name and the bearer is the recipient. Special Endorsement: This is where the endorser signs and specifies who will get the cash. Endorsement with Restrictions: This prevents further discussion.

To know more about endorsement visit:

https://brainly.com/question/29734234

#SPJ1

You have 20 users who will be bringing their own mobile devices, tablets or laptops to connect to their work data. This will improve productivity, but they are concerned with what control they have over the users' access to corporate data. How will Windows 10 help the company manage users who bring their own devices?

Answers

More safe – When it comes to being infected by viruses and malware, Windows 10 is twice as secure as Windows 7 because it was created with security in mind. A deeper integration between Office 365 and OneDrive guarantees the security and portability of your data across numerous devices.

What Windows 10 help the company manage users?

They may quickly transition devices into a corporate-managed state from the cloud when you offer them Azure AD Join with automated Intune MDM enrolment.

Therefore, Your staff members can set up their own machines using Windows 10: They can set up corporate access with Azure AD join for corporate devices.

Learn more about Windows 10 here:

https://brainly.com/question/28847407

#SPJ1

if you type =8 / 2 * 4 + 1 into a cell in a spreadsheet and then press enter, what will appear in the cell?

Answers

Answer: 17. In spreadsheet such as Excel and other, we can type directly into the cell the operation “8 / 2 * 4 + 1” and any condition function, formula, or mathematical equation, but we must first place the sign “= “.

Type function into a cell in a spreadsheet

We can insert function into a cell using the menu, proceed as follows:

Choose a cell where the result will be displayedConfigure the selected cell using the “insert” menu tool, then we choose “function” and then select between the “categories” that are shown.Finally, we configure the values, conditionals, mathematical operators, among others depending on the type of function.

Below is an image of the spreadsheet that shows the formula and the result.

To learn more about spreadsheet see: https://brainly.com/question/4965119

#SPJ4

consider the development of an ssh client, a tool that you should be familiar with, having used it since cs252 (e.g., putty). write a functional requirement that you might expect to find in a software requirements specification for this program. write a non-functional requirement that you might expect to find in a software requirements specification for this program.

Answers

Internet LAN card, modem, CPU, and hard drive are system minimums, along with 64MB of RAM. Program requirements include portability, security, availability, and reliability.

By development, what do you mean?

Growth, advancement, positive change, or the adding of physical, economic, physical, social, and demographic components are all products of development.

Briefing:

Interfaces with menus. The following will be covered:

Download, bookmark, spell-check, search engine widget, security settings, private browsing, pop-up blocker, and history search

hardware specifications

Internet LAN card, modem, CPU, and hard drive are system minimums, along with 64MB of RAM.

requirements for this program.

Reliability: It supports the newest features in accordance with user needs.

Accessibility: It is available for download from the website.

Security: The privacy mode is supported.

It handles all software packages, making it portable.

To know more about Development visit:

https://brainly.com/question/30036072

#SPJ4

which of the following is true of the java programming language in relation to protection? a. when a class is loaded, the jvm assigns the class to a protection domain that gives the permissions of that class. b. it does not support the dynamic loading of untrusted classes over a network. c. it does not support the execution of mutually distrusting classes within the same jvm. d. methods in the calling sequence are not responsible for requests to access a protected resource.

Answers

Correct answer:- (a) When a class is loaded, the JVM assigns the class to a protection domain that gives to a protection domain that gives the permissions of that class.  

Why is Java an Internet programming language that is secure?

A sizable selection of APIs, tools, and implementations of widely used security algorithms, processes, and protocols are included in the Java security framework. Authentication, access control, secure communication, public key infrastructure, cryptography, and other topics are all covered by the Java security APIs.

What JVM alternatives are there?

When it comes to JVM options, there are three categories you can choose from: standard, non-standard, and advanced options. You always use the option with -XX if you want to try an advanced option. Similarly, you use -X when applying a non-standard option.

What does Java mean by a protective domain?

The Protection Domain class encapsulates the properties of a domain that contains a number of classes whose instances, when performed on behalf of a particular group of Principals, are assigned a particular set of permissions.

To know more about java programming visit:

https://brainly.com/question/18554491

#SPJ4

which term is not a method for practicing green computing? choices: virtualization, cloud computing, cookies, server workloads moved to off-peak hours, tidal powered servers

Answers

To "virtualize" anything is to create a virtual or artificial version rather than the real thing. virtualization  term is not a method for practicing green computing.

What is green computing?The design, manufacture, use, and disposal of computers, chips, other technology components, and peripherals in a way that limits the negative impact on the environment, including reducing carbon emissions and the energy consumed by manufacturers, data centres, and end-users, is known as green computing (also known as green IT or sustainable IT). In addition to choosing raw materials with sustainable sourcing, minimising electronic waste, and promoting sustainability through the use of renewable resources are all included in green computing.There is a lot of potential for green computing to be environmentally beneficial. Between 1.8% and 3.9% of the world's greenhouse gas emissions are attributable to the information and communication technology (ICT) industry. Furthermore, data centres now consume 3% of all energy consumed annually, a 100% increase over the previous ten years.

To learn more about green computing refer to:

https://brainly.com/question/22879179

#SPJ4

Nadia has found some interesting information on the internet that supports the main idea of a paper that she is writing. She wants to make sure the information she has found is valid and comes from a credible source. What steps can Nadia take to effectively determine if the information she has found online is accurate and valid?

Answers

Nadia can effectively determine if the information she has found online is accurate and valid by knowing that the importation gotten from the below factors are valid and credible:

Encyclopedias.Textbooks.Websites that stat with . edu or . org domains.News sources that has  first-hand reporting.Research-oriented magazines such as ScienceMag, Nature Weekly etc.

Why is a source reliable and trustworthy?

The ability to recognize reliable sources is crucial. Understanding depth, objectivity, currency, authority, and purpose are prerequisites for this skill. It is a good idea to assess your source using these five criteria regardless of whether or not it has undergone peer review.

Therefoe, one can say that complete, well-supported hypothesis, argument, discussion, etc. based on solid evidence is a sign of a credible source. scholarly, peer-reviewed books or articles that have been authored by academics for academics. original study with a large bibliography.

Learn more about credible source from

https://brainly.com/question/24266723
#SPJ1

you have a website that accepts input from users for creating customer accounts. input on the form is passed to a database server where the user account information is stored. an attacker is able to insert database commands in the input fields and have those commands execute on the server. which type of attack has occurred? answer sql injection dll injection cross-site scripting buffer overflow

Answers

The website has experienced a SQL injection attack. SQL injection is a type of cyber attack in which an attacker inserts malicious code into an input field in order to execute unauthorized database commands on a server.

What is SQL injection attack ?SQL injection attacks often involve the injection of malicious SQL statements into a web form or other input field, which are then passed to a database server for execution. These attacks can be used to access or modify sensitive data, disrupt database operations, or even take over the database server itself. SQL injection attacks are often possible because of poor input validation or insufficient security controls on the server. To prevent SQL injection attacks, it is important for websites to carefully validate user input and to use prepared statements or parameterized queries to prevent the execution of malicious SQL code.

To learn more about SQL injection refer :

https://brainly.com/question/29851314

#SPJ4

Within minutes, flashing lights illuminated the shattered windows. Paramedics examined both of them. When they were told they needed to go to the emergency room, Eli protested. He refused to get into the ambulance as Dave had already done.

The paramedics tried to reason with him. Eventually, he relented and mounted the stretcher.

His panic about the coming medical costs distracted him from the pain in his neck. All he could think about was the hardship this would bring upon his parents. Soon, though, his thoughts were drowned out completely by the siren’s shrill blaring.

Several months later, the insurance claims had all been processed. Because Dave was not at fault in the crash, the other driver’s insurance had to pay for everyone’s medical bills. Eli and his father breathed a sigh of relief.

Which conclusions can be drawn about Eli’s situation? Check all that apply.

He may still be covered in some cases.
He can avoid problems by being cautious.
He faces more risk than insured people do.
He may have to take precautions, but many factors are beyond his control.
Not being able to afford insurance was a factor in him not being covered.

Answers

Not being able to afford insurance was a factor in him not being covered. Hence option D is correct.

What is insurance?

Insurance is defined as a legal arrangement whereby an insurer defends another against losses resulting from particular calamities or dangers. It helps shield the insured person or their family from monetary loss.

It should be mentioned that Eli initially resisted being placed on the stretcher even after the accident. Textual proof demonstrates that he became anxious about the impending expenses as a result of his lack of insurance.

Thus, not being able to afford insurance was a factor in him not being covered. Hence option D is correct.

To learn more about insurance, refer to the link below:

https://brainly.com/question/27822778

#SPJ1

Answer:

AAAA BBBB DDDDD EEEEE

Explanation:

a client creates a packet to send to a server. the client is requesting pop3 service. what number will be used as the destination port number in the sending packet?

Answers

Since the client creates a packet to send to a server. the client is requesting pop3 service. The number that will be used as the destination port number in the sending packet is 110.

What is the meaning of port destination?

A destination port is the TCP or UDP number used by a program on one side of a communication to receive data from another program on the other end. Port of Destination refers to the location of the port at where the items are to be delivered for collection by the Customer.

Therefore, the  location port number can be seen by:

Type "Cmd" into the search bar.Activate "Command Prompt."To view your port numbers, type netstat -a into your terminal.

Learn more about data analyst from

https://brainly.com/question/28812440
#SPJ1

jolie wants to see a list of, and manage, apps on her android phone. where can she go on her phone to do this?

Answers

Jolie wants to see a list of, and manage, apps on her android phone. She can go on her phone to do this in Settings. The correct option is c.

What are applications in phones?


An application, or simply "app," is software that gathers particular functionality into one easily accessible package.

Both the Android and iOS app stores have millions of apps available that provide services (or verticals). from any location. Swipe your screen upward from the bottom to the top. Tap All Apps if it appears. Click on the app you want to launch.

Therefore, the correct option is c, Settings.

To learn more about applications, refer to the link:

https://brainly.com/question/16875474

#SPJ1

The question is incomplete. Your most probably complete question is given below:

App drawer. The dock. Settings. File manager

Create a Python program that ak the uer to enter 3 poitive number. The program hould validate that the character that the uer entered formulate a valid poitive integer and diplay an appropriate error meage if they do not. The program hould ue a equence of conditional (if) tatement to diplay the 3 poitive number in acending order

Answers

Answer:

while True:

   try:

       num1 = int(input("Enter a positive integer: "))

       if num1 < 0:

           raise ValueError

       break

   except ValueError:

       print("Invalid input. Please enter a positive integer.")

while True:

   try:

       num2 = int(input("Enter a positive integer: "))

       if num2 < 0:

           raise ValueError

       break

   except ValueError:

       print("Invalid input. Please enter a positive integer.")

while True:

   try:

       num3 = int(input("Enter a positive integer: "))

       if num3 < 0:

           raise ValueError

       break

   except ValueError:

       print("Invalid input. Please enter a positive integer.")

if num1 < num2 and num1 < num3:

   if num2 < num3:

       print(num1, num2, num3)

   else:

       print(num1, num3, num2)

elif num2 < num1 and num2 < num3:

   if num1 < num3:

       print(num2, num1, num3)

   else:

       print(num2, num3, num1)

else:

   if num1 < num2:

       print(num3, num1, num2)

   else:

       print(num3, num2, num1)

When I want to view the Internet, I use this tool that converts html code into a visual format for users to view and interact with

URL
search engine
directory
browser

Answers

Answer:

browser

hope this helps

This string method returns a copy of the string with all leading and trailing whitespace characters removed.a. cleanb. stripc. remove_whitespaced. rstrip

Answers

In Java, you can use the trim() function to get rid of leading and trailing spaces. The return value of this method is either a copy of this string with the leading and trailing white space removed, or this string if there is no leading or trailing white space.

If you use the split method on a string, does it split the string into two substrings?

A string is split into two substrings when you call the split function on it. A string's starting index is indicated by this. If you attempt to utilize an index that is outside the acceptable range for a string, this will occur. This function gives back a string's length.

Which method returns the string's leading and trailing characters?

The Python programming language includes a built-in function called Python String strip() that returns a duplicate of the string without the leading and trailing characters (based on the string argument passed). There is a solitary optional parameter in it.

To know more about string's split method visit;

https://brainly.com/question/20470489

#SPJ4

HELP ASAP 50 POINTS!!!!
Are all digital footprints bad? Why?

Answers

Answer:

No

Explanation:

Because jobs and pretty much everyone that works on higher level ends can see those footprints. Once you leave a bad reputation, some jobs may not want you. other jobs may just not even contact you. it’s important for your future to keep a positive attitude and footprint on the internet

Other Questions
IJ is a midsegment of triangle MLN. What is the length of segment IJ? 23 grams of sodium Chloride reacts with oxygen to produce Sodium oxide and how many moles of chlorine?Question 3 options:9.14 mol4.98 mol.20 mol.87 mol With enough variables, it is possible to get an R2 value close to 1, even if the variables have no particular meaning in the modelA)TrueB)False Consider the following inference: Individuals with Dyslexia and ADHD struggle with understanding how other people are feeling because they misinterpret emotions and meanings of words. Part AMANUFACTURING A fashion company spends $10 to produce a pair of jeans and $2 to produce a shirt. During atypical month, they spend $3500 on the production of jeans and shirts. During months in autumn, though, theydouble the pairs of jeans produced and spend a total of $6000. How many pairs of jeans and t-shirts does thecompany make during a typical month?Letj= number of pairs of jeans and k = number of shirts.Part AWrite the system of equations.Select Choice vj+ Select Choice k= 3500Select Choice v + Select Choicek=6000 true or false: the serratus anterior muscle works with the pectoralis minor muscle and helps to stabilize the scapula. University Car Wash built a deluxe car wash across the street from campus. The new machines cost $267,000 including installation. The company estimates that the equipment will have a residual value of $24,000. University Car Wash also estimates it will use the machine for six years or about 12,000 total hours. Actual use per year was as follows: Year Hours Used 1 3,000 2 1,200 3 1,300 4 2,700 5 2,500 6 1,300 Required: 1. Prepare a depreciation schedule for six years using the activity-based method. (Do not round your intermediate calculations.) (04.04 LC)The functions f(x) = 2x + 30 and g(x) = 3x + 10 are shown in the graph.graph of f of x equals negative 2 times x plus 30 and g of x equals 3 times x plus 10Determine the approximate ordered pair for f(x) = g(x). a(4, 22) b(22, 4) c(4, 18) d(18, 4) Question content area top Part 1 Suppose you deposit $ in a bank account with a simple interest rate of %. You want to keep your deposit in the bank long enough to earn at least $ in interest. How long should you keep your deposit in the bank? Question content area bottom Part 1 To earn at least $ interest, you should keep your deposit in the bank for enter your response here year(s). (Round up to the nearest year.) The fox population in a certain region has a continuous growth rate of 6 percent per year. It is estimated that the population in the year 2000 was 25100.(a) Find a function that models the population t years after 2000 ( t=0 for 2000).Your answer is P(t)=(b) Use the function from part (a) to estimate the fox population in the year 2008.Your answer is (the answer must be an integer) type a correctly formatted editors portion of the citation in the text box. don't forget proper formatting and punctuation what type of precipitation is most common in d climates? what type of precipitation is most common in d climates? convectional frontal orographic quadratic Suppose you get $1000 from your uncle. you deposited that money in a bank and added $15 per month.Write an equation to model how much money you have deposited after m months. Let s be the amount you have deposited.What equation would you solve to figure out how many months it would take to save $10,000 dollars?How many months would it take to save $10,000? Can anyone who has read Ethan frome help me come up with a central idea and what literacy device does the author use to develop that central idea plss helpppp The U.S. Attorney General mainly deals with __________.A. foreign policyB. court cases C. armed forces D. tax issues Neurons in the sympathetic nervous system that synapse onto the adrenal glands release which neurotransmitter?. Using details from the poem, write a word that has the same denotation as flicker. Then think about the connotations of the word flicker. Why did the poet choose flicker rather than another word with a similar definition? Use details from the poem to support your answer. a client in early labor is having uterine contractions every 3 to 4 minutes, lasting an average of 55 to 60 seconds. an internal uterine pressure catheter (iupc) is inserted. the intrauterine pressure is 65 to 70 mm hg at the peak of a contraction and the resting tone is 6 to 10 mm hg. based on this information, what action should the nurse implement? Can someone help me?? please give the correct answer any wrong answers or random ones will be removed! thank you :) What is the simplified expression for 2 power 2 multiplied by 2 power 3 over 2 power 4