Answer:
import math
math.sqrt( x )
Explanation:
The basic code that can be written to calculate the square root of a number is as follows
import math
math.sqrt( x )
just need to know if these are correct
Answer:
Yes, they are correct.
Answer:yea g
Explanation:
What is the output of this program?
grades = [89, 70, 98, 100, 83]
print(grades[-4])
Group of answer choices
89
100
70
98
Answer:
70 is the answer negative one begins from 83 and count down to 89, Therefore, 70 is is -4 and is chosen as the best answer
When using the Photo Album dialog box, a picture
cannot be modified in this view.
cannot have text added.
can be inserted from a file or disk.
will be permanent when added to the box.
Answer:
can't have text added and will be permanent when added to the box
4. Which of the following is a face-to-face meeting between the hiring party and the applicant?
A. Interview
B. Application
C. Résumé
D. Reference
Answer:
A. interview
Explanation:
so i just went to play forge of empires and when i logged on to it all of my progress was gone and i was so far in to it
Answer:
That's tough...
Explanation:
Answer:
ok and?
Explanation:
This is not a question
Which of the following belongs in a website citation? (select all that apply)
the place where the author works
the Internet address or web page address
the person or organization responsible for the website
page numbers
the date when you got the information
Answer:
the Internet address or web page address
the person or organization responsible for the website
the date when you got the information
Explanation:
PLEASE HELPPPPP ASAP, 50 POINT'S + BRAINLIEST
1.) Online crimes causing loss of money: give 5 names and examples to each
2.) Online misconduct or crimes targeting medical offices and services: give 5 names and examples to each
3.) Online misconduct or crimes that you have experienced: give 5 names and examples to each
Answer:
1. Cybercrimes are online crimes that cause loss of money some examples are: Identity fraud, Cyber bribery, Debit/credit card fr/ud, and Email fr/ud.
2. In medical offices devices linked to CT scans are able to be h/cked, there is r/nsomw/re that uses their devices. Since medic/l computers are always linked to the internet. it makes it easier for them to be h/cked. They make an employee click on an e-mail carrying m/lw/re, then the cybercrimin/ls encrypt p/tient data then dem/nd p/yment for its decryption.
3. This is a personal question but if you have ever been sc/mmed or witnessed someone being sc/mmed or almost got sc/mmed it might apply to this question
Which of these is a discipline?
software manager
customer service specialist
help desk technician
software engineering
Answer:
Option D
Explanation:
Discipline here refers to any educational course in which a person studies.
software manager , customer service specialist and help desk technician are basically the job designations and not discipline in which one can pursue study.
However, software engineering is a discipline as one can educate himself/herself in this discipline and become a software engineer.
Hence, option D is correct
How does a computer get the server's IP and how does it know which way to the server?
Functions of file in computer
[tex]\huge{\textbf{\textsf{{\color{pink}{An}}{\red{sw}}{\orange{er}} {\color{yellow}{:}}}}}[/tex]
File in computers are used to store data, information and commands.
Thanks hope it helps.Pls mark as brainliest.Fatima has 3 packs of batteries. Each pack contains 4 batteries. She gives her brother 8 batteries to put in his toy robot. Let b represent the number of batteries Fatima has left. Which equation could be used to find the value of b?
Answer: See explanation
Explanation:
Let b represent the number of batteries Fatima has left.
The equation that can be used to find the value of b goes thus:
(3 × 4) = b + 8
12 = b + 8
b = 12 - 8
Therefore, based on the above equation, the number of batteries that Fatima has left will be 4.
which feature of project management includes monetary compensation for the employees
Answer:
Extrinsic compensation
Explanation:
The feature of project management that includes monetary compensation for employees is the Extrinsic compensation.
Extrinsic compensation is reward ( tangible ) given to workers/employees by the management of a project for the speedy completion of a task or for the completion of a specific task . It can in the form of monetary compensation or non-monetary compensation.
example of Non-monetary compensation includes certificate of honor, medical insurance .
example of monetary compensation includes : work Bonuses , salaries
Choose the expression that belongs in the blank in order to have the output shown.
>>> a = 5
>>> print(_____)
The value is5
"The value is " + str(a)
"The value is" , str(a)
"The value is " , str(a)
"The value is" + str(a)
Answer:
Option B
Explanation:
Given
a = 5
and if the value allotted to variable a is to be printed, the following command will be used
print "The values is", str(a)
Hence, option B is correct
What is fish processing?
In VPython, which line of code creates a ball five units away from the user from the center?
ballPosition = _______
myBall = sphere(pos = ballPosition)
vector(0, 0, -5)
vector(0, -5, 0)
vector(-5, 0, 0)
The line of code creates a ball five units away from the user from the cente is ballPosition = vector(0, 0, -5)
What is python code?In Python, there is found to be a generally used coding language such as HTML, etc.
Know that it is often used in programming and software creation and as such, having the ballPosition = to be vector(0, 0, -5) myBall = sphere(pos = ballPosition) is the right thing to do.
Learn more about VPython from
https://brainly.com/question/26497128
#SPJ2
No links it’s just a normal question about iPhones.
If you have someone in your contacts you talk with a lot but like everyday you delete the conversation multiple times will you stop receiving texts from that person even if you text them and it says delivered?
Answer:
You will still get the messages. You are just deleting the messages from YOUR device not the other persons, in order to stop recieving messages from the person you block them. In order to stop receving notifications, you put them on DND. But, if you talk to them everyday I would assume you would not want to stop receiving messages from them.
True or False
Operating systems control the loading of software applications onto a computer
All OSs offer user preferences allowing you to customize your computer
I used this from a other.
False
Software is the collection of large program or instruction of codes, which is used to perform some task. It is of two types of system software and application software.
The system software is used as a container for the application software and it is used to handle all other software it is used to operate the system.
Application software is used to perform any operation. This type of software can be used by the user if it is installed on the local machine on any system software
The operating system is also the part of the system software because it is used to operate the system and it is also the soul of the computer system which is also the function of the system software but the above question states that the operating system is not the part of the system software which is not correct. Hence false is the correct answer to the above question.
Consider the classes below: Which of the following statements is true? Group of answer choices The value of counter will be different at the end of each for loop for each class. The value of j will be the same for each loop for all iterations. Both The value of counter will be different at the end of each for loop for each class and The value of j will be the same for each loop for all iterations are true. Neither The value of counter will be different at the end of each for loop for each class nor The value of j will be the same for each loop for all iterations is true.
Answer:
probly
Explanation:
Both The value of counter will be different at the end of each for loop for each class and The value of j will be the same for each loop for all iterations are true.
What does the revolver do?
sends the domain name and requests the IP address
sends the IP address and requests the content of the web page
sends the IP address and requests the domain name
sends the domain name and requests the content of the web page
Answer:
last one
Explanation:
first calculating device
Answer:
abacus is first calculating device
What requirements are necessary in order for you to share a file?
Check all that apply.
You own it.
You commented on it.
You can edit.
You know about the topic of the document.
Answer:
I. You own it.
II. You can edit.
Explanation:
A file can be defined as a computer resource that avails end users the ability to store or record data as a single unit on a computer storage device.
Generally, all files are identified by a name and type such as audio, image, video, document, system, text, etc. Each type of files can be transferred or send from one computer node to another computer node through the use of a wired or wireless connection and with the necessary level of permission.
The requirements which are necessary in order for you to share a file are;
I. You must own the file. This simply means that you have the authority to share the file and have it saved on your device.
II. You have the permission or required credentials to edit the file. A read-only permission cannot be used to edit a file but a full permission can be used.
BRAINLIEST 14 points
The Great Firewall of China _____. Select 4 options.
blocks websites
filters all emails
filters social media
filters web searches
jams signals
Answer:
the first four options
Explanation:
they make the most sense
The Great Firewall of China is designed and developed to:
Block websites.Filter all emails.Filter social media.Filter web searches.What is the Great Firewall of China?The Great Firewall of China can be defined as a set of legislation and network security protocol that domestically monitors, regulates and controls inbound and outbound Internet traffic in the People's Republic of China, based on set aside security rules.
In this context, the Great Firewall of China is designed and developed to domestically:
Block websites.Filter all emails.Filter social media.Filter web searches.Read more on Great Firewall of China here: https://brainly.com/question/27411286
#SPJ2
Ishmael would like to capture a selected potion of his screen and then capture action he performs on that selected portion. What should he do?
Use a video from my PC command
User the insert screen recording control
Create a poster frame
Use an embed code
Answer: User the insert screen recording control
Explanation:
Since Ishmael wants to capture a selected potion of his screen l, after which he'll then capture the action that he performs on that selected portion, he should use the insert screen recording control.
It should be noted that on most keyboards, there's an "insert screen" button. Also, Ishmael can simply open the window that he wants to screenshot and then click the screenshot button.
Therefore, the correct option is B.
Which of the following is the term for a device (usually external to a computer) that is plugged into a computer's communication
port or connected wirelessly?
An attachment
A peripheral
A flash drive
A plug-in
A device, usually external to a computer that is plugged into a computer's communication port or is connected wirelessly. Common peripherals are keyboards, mice, monitors, speakers, and printers
The term for a device (usually external to a computer) that is plugged into a computer's communication port or connected wirelessly is:
B. A peripheralAccording to the given question, we are asked to find the correct term for a device which is plugged to a computer's communication port wirelessly
As a result of this, we can see that a peripheral device is used to connect to a computer wirelessly and some common examples include a keyboard, mouse, joystick, etc.
Therefore, the correct answer is option B
Read more here:
https://brainly.com/question/20488785
what is faster C++ or go lang
Answer:
C++
Explanation:
HELPPP ME PLEASEEE!!
Which connection type is a wireless method of sending information using radio waves?
O Cable
O Wi-Fi Fiber
Otic cable
O Broadband
please i need help but dont put up a wed site
Hoped that helped lol, but yeah, the rest of them need wires
Edit: CAN I HAVE BRAINLIEST.
What is the correct HTML for adding a background color?
Question 7 options:
< background>yellow
< body background-color=yellow>
< body bg="yellow">
< body style="background-color:yellow;">
Answer:
< body background-color=yellow>
Explanation:
This is the correct HTML command that is used for adding a background color of choice.
Which list shows a correct order of mathematical operations that would be used by a spreadsheet formula?
Answer:
It stands for Parentheses, Exponents, Multiplication/Division, Addition/Subtraction.
Your program has a loop where a user guesses a letter.
Your program compares the guess to each letter in the word.
Finish the code.
for n in range(lenWord):
if _______ == letter:
blanks = blanks[:n] + letter + blanks[n+1:]
correct[n]
correct
correct(n)
Answer:
its correct[n]
Explanation:
for n in range(lenWord):
if correct[n] == letter:
blanks = blanks[:n] + letter + blanks[n+1:]
A loop in a computer program is an teaching that repeats until a specified condition is reached.
In a loop structure, the loop asks a question. If the answer needs action, it is executed. The same question is asked again until no other action is required.
What are loops used for in programming?A Loop is employed to repeat a specific block of code a over and over. There are two main types of loops, for loops and while loops.
What are the 3 types of loops in programming?In Java, there are three kinds of loops which are – the for loop, the while loop, and the do-while loop. All these three loop constructs of Java executes a set of replicated statements as long as a specified condition stays true.
To learn more about A loop, refer
https://brainly.com/question/26568485
#SPJ2