Answer:Please see explanation
Explanation:As I know the answer is A(True)
If you see the question is true please votes 5 stars and 1 heart
PYTHON- Credit card numbers follow a standard system. For example, Visa, MasterCard, and Discover Card all
have 16 digits, and the first digit serves to indicate the card brand. All Visa cards start with a 4;
MasterCard cards always starts with a 5; and Discover cards start with a 6. Write out a program that
prompts for a credit card number and emits the name of the brand. If the card brand cannot be
determined, the program should output "Unknown Card"
Answer:
ccard = input("What is your credit card #: ")
if ccard[0] == 4:
print("Visa")
elif ccard[0] == 5:
print("MasterCard")
elif ccard[0] == 6:
print("Discover")
else:
print("Unknown Card")
How can you legally use the search engine
measurement, analysis and iteration forms which stages of the strategy and planning process
Answer:
science is what it is that science
Explanation:
Declare an eight by eight two-dimensional array of strings named chessboard.
Answer:SOLUTION:
String [][] chessboard = new String [8][8];
PROCEDURE: Therapeutic infusion of saline solution with 5% dextrose IV, 500 ml for dehydration, lasting 48 minutes. what is the right cpt code and hcpcscode?
Answer:
no
Explanation:
yes becouce not arance the name of fegeur spech
demons I shall be your eternal nightmare
To create a cell reference in another spreadsheet you must need to start with _______ sign.
a. = = b. & c. = d. $
Answer:
You need to start with c) =
What is Smart Content Profits all about?
Answer:
Smart Content Profits is a ground-breaking app that builds WordPress sites on auto-pilot. Just add in a domain and let this system do the rest.
Answer: A friendly system that lets you build content sites very quickly.
Explanation:
What is the key benefit of the least privilege approach
to security?
o It results in task being completed quicker
o It minimises the level of compromise in the event of a security breech
O Ensures modular, reusable output
Answer:
2nd
Explanation:
it has a low security
To change the type of tab showing in the Tab Selector Box, which of the following should be done? Right-click on the Tab Selector Box Click on the Ruler Right-click on the Ruler Click on the Tab Selector Box
Literally, a tab selector presents to the user varieties of tab marker options.
To change the type of tab, you simply (d) Click on the Tab Selector Box
The tab selector is situated at the left of the ruler, and there are four basic types of tabs.
Left-alignedCenteredRight-alignedDecimal-aligned.To change between these tabs, you simply click on the tab selector.
Hence, the correct option to change the type of tab is option (d)
Read more about tab at:
https://brainly.com/question/14459387
What type of data causes concern for institutions or business when collected, stored, and not secured properly?
Advertising information
Personal identifying Information
User interface information
Marketing information
Answer:
user interface information
Explanation:
This is because it exposes the infrastructure of the business or institution which includes the layout of plans and future perspective
The type of data that causes concern for institutions or business when collected, stored, and not secured properly is Personal identifying Information.
What is Personal identifying Information?Personal Identifiable Information (PII) is known to be any depiction of information that allows the identity of a person to whom the information is given to be reasonably taken by direct or indirect method.
Therefore, The type of data that causes concern for institutions or business when collected, stored, and not secured properly is Personal identifying Information as it can lead to issues and lawsuit if tampered with.
Learn more about Personal Information from
https://brainly.com/question/25228524
#SPJ6
How do you setup Synapse x? Please explain each step
1. You download the compressed file from the website
2. Create a new folder on your desktop, then copy the file location.
3. Right click on the compressed file that contains Synapse X
4. Select “Extract all,” then paste the file location of the folder you wish to keep it in, and click “Extract.”
5. Make sure Windows Real-time Protection is OFF before trying to run the .exe file, otherwise your OS will automatically delete the .exe file then you'll have to delete all the contents from your folder and restart from step 3.
You can find the Windows Real-time Protection option by going to the Windows search bar and typing "Virus and Threat Protection,"
then clicking on the "Manage Settings" button underneath the "Virus & threat protection" tab, then disabling Real-time Protection.
It will give you a prompt warning you that your PC could be open to threats, however as long as if you're not downloading shady things from shady sites, and you're not discoverable on your Wi-Fi network, you'll be fine without it.
Keep in mind, Real-time Protection automatically turns itself back on after a set amount of time of it being disabled. So you'll have to disable it every time you wish to use Synapse X.
6. Once you've done all of that, just follow the prompts that Synapse X gives you, give your whitelist code, log in, and you're set.
List and Explain the programming Languages required to start working in Apple.
Answer:
JavaScript, Java, and C++ are obvious additions. Mastering these programming languages can help you land a secured job at Apple. If you pay attention to the popularity of programming language skills, Python is an immensely popular generalist programming language across all leading tech companies
Jacob is a network technician who works for a publishing company. He is setting up a new hire's access permissions. The new hire, Latisha, is an editor. She needs access to books that have been accepted for publication but are in the review stage. Jacob gives her access to the network drive containing only books in review, but not access to administrative or human resources network drives. What principle is Jacob applying
If Jacob gives her access to the network drive containing only books in review, but not access to administrative or human resources network drives. The principle that Jacob is applying is: The principle of least privilege
Principle of least privilege is a principle that help to protect confidential or sensitive information from unauthorized use.
Which means that a user is only authorized or given the permission to access least information or information which the user only need to carryout their assignment or tasks.
Principle of least privilege is important as it help to minimize or limit the damages that can arise due to unauthorized usage.
Inconclusion if Jacob gives her access to the network drive containing only books in review, but not access to administrative or human resources network drives. The principle that Jacob is applying is: The principle of lease privilege.
Learn more here:
https://brainly.com/question/14132911
Where do you find the option to Restore a Davinci Resolve Archive project file?
how to calculate 3 X (50 + 40) ÷ 5 on excel 2016
Answer:
I think this might help, don't know much of this
Explanation:
How do you calculate 3.5 increase in Excel?
How To Increase a Number By a Percentage. If want to calculate a percentage increase in Excel (i.e. increase a number by a specified percentage), this can be done by simply multiply the number by 1 + the percentage increase. - which gives the result 60.
Explanation:
I am not sure what your problem is.
you don't know how to enter a formula into an Excel cell ? or you don't know how to combine the content of cells into one result in another cell ? or ... ?
but just answering literally this one-line-problem-definition
you click into an empty cell and type
=3*(50+40)/5
and press return.
and the cell will show you the result. 54
Identify the commands for the following list operations.
Check that there are no items in a list
Insert 10, 50, 30, 40, and 20 at the end of the list
Arrange the items in ascending order
a. IsEmpty(list)
Prepend(list, 10)
Prepend(list, 50)
Prepend(list, 30)
Prepend(list, 40)
Prepend(list, 20)
Sort(list)
b. Search(list)
Append(list, 10)
Append(list, 50)
Append(list, 30)
Append(list, 40)
Append(list, 20)
Sort(list)
c. IsEmpty(list)
Append(list, 10)
Append(list, 50)
Append(list, 30)
Append(list, 40)
Append(list, 20)
GetLength(list)
d. IsEmpty(list)
Append(list, 10)
Append(list, 50)
Append(list, 30)
Append(list, 40)
Append(list, 20)
Sort(list)
Answer:
D
Explanation:
the answer is D because it does exactly what the problem says.
A printer is considered to be in the category of
a. software
Selected:b. hardware
c. operational system
d. equipment
A printer is considered to be in the category of b. hardware.
What is hardware?Computer hardware contains the physical characteristics of a computer, such as a case, central processing unit (CPU), random access memory (RAM), monitor, mouse, keyboard, computer data storage, pictures card, sound card, speakers, and motherboard.
Hardware directs to the physical components of a computer. Also directed to as the machinery or the equipment of the computer. Examples of hardware in a computer exist the keyboard, the monitor, the mouse, and the processing unit However, most of a computer's hardware cannot be caught; It's inside the computer case.
A printer exists as an external hardware output device that brings the electronic data stored on a computer or other device and develops a hard copy.
Hence, A printer is considered to be in the category of b. hardware.
To learn more about hardware refer to:
https://brainly.com/question/24370161
#SPJ2
What is the best Computer in the World?
Wrong answer will be reported!
Dell XPS Desktop Special Edition is the best Computer in the World
▪▪▪▪▪▪▪▪▪▪▪▪▪▪▪▪
Cutest Ghost▪▪▪▪▪▪▪▪▪▪▪▪▪▪▪▪
The roots of the quadratic equation ax² + bx + c = 0, a ≠ 0 are given by the following formula:
Quadratic Formula
In this formula, the term b² - 4ac is called the discriminant. If b² - 4ac = 0, then the equation has a single (repeated) root. If b² - 4ac > 0, the equation has two real roots. If b² - 4ac < 0, the equation has two complex roots.
Instructions
Write a program that prompts the user to input the value of:
a (the coefficient of x²)
b (the coefficient of x)
c (the constant term)
The program then outputs the type of roots of the equation.
Furthermore, if b² - 4ac ≥ 0, the program should output the roots of the quadratic equation.
(Hint: Use the function pow from the header file cmath to calculate the square root. Chapter 3 explains how the function pow is used.)
Format your output with a decimal precision of 2.
Manufactured computers and cell phones are part of which industry? Electronics Chemicals Machinery Metal products
Answer:
The correct answer is the electronic industry
Hope this helps
Answer:
Electronics
Explanation:
Create a set of functions that compute the mean, median, and mode of a set of
numbers. Section 5.4 - Example: Using a List to Find the Median of a Set of Numbers
provides a simple algorithm for calculating the median for a set of numbers. Each
Function should expect a list of numbers as an argument and return a single number
Each function should return O if the list is empty. Include a main function that tests
he three statistical functions with a given list. Do not use the statistics or math
nodules to create the functions. The functions must be created by you.
Refer to the attachment.
Language used=Python
Answer:
Create a set of functions that compute the mean, median, and mode of a set of
numbers. Section 5.4 - Example: Using a List to Find the Median of a Set of Numbers
provides a simple algorithm for calculating the median for a set of numbers. Each
Function should expect a list of numbers as an argument and return a single number
Each function should return O if the list is empty. Include a main function that tests
he three statistical functions with a given list. Do not use the statistics or math
nodules to create the functions. The functions must be created by you.
2) RMU divides students into house groups based on the month that they were born in.
born in May, June, July or August are put into Bridge House. All other students are
Students born in January, February, March or April are put into Ship house. Students
put into Anchor house.
Design a flowchart that will:
. Ask the user to enter a number (1 to 12) relating to their birth month
Decide which house they are in and print this out.
Keep a running total of how many students are in each house.
Repeat the above for 20 students.
When 20 students have entered their details, print out how many students are in
each house
describe your childhood
Question 3 A benefit of using online tools is that: O you have more privacy because the information is stored locally on your computer. they are accessible anywhere you have the internet. it is the only way to utilize essential business software. everything is stored in the same place. Question 4
Answer:
False, it doesn't mean that if a application is stored on a device, it can't steal any data. Take cloud service for example it is not locally stored on your computer it is stored on the huge amount of databases, meaning that the service provider could steal the files or delete them without consent.
Describe briefly three applications/systems that can be used to add digital signature to a document?
Answer:
Applications of Digital Signature
To send and receive encrypted emails, that are digitally signed and secured.
To carry out secure online transactions.
To identify participants of an online transaction.
Explanation:
Several scholarship opportunities exist to assist students in pursuing STEM-related degrees.
True
False
a printer gives hard output whereas a screen gives_ output
Answer:
Explanation:
Easy,soft copy output as the output given by a screen only can be seen but can't be touched
Briefly describe the following advanced database systems and applications: object-relational databases, spatial databases, text databases, multimedia databases, the World Wide Web
Object-relational databases (ORD) are a type of database management system (DBMS) designed based on an object-oriented database model. The database framework and query language of ORD support objects, classes, and inheritance.
Spatial database is a kind of database designed for keeping and querying data that depicts objects specified in a geometric area.
Text database is a type of database designed to handle the maintenance of huge text compilation, then create quick and valid access to it.
Multimedia database is a type of database that saves multimedia data, including text, images, graphic objects, animation, audio, video, etc.
The World Wide Web is an information system that connects several documents through hyperlinks and can be accessed or retrieved through the internet. It is usually termed as web.
Hence, in this case, it is concluded that this advanced database and applications are vital in the modern world.
Learn more here: https://brainly.com/question/13044551
I have problems in compiling this Java code:
class SumMatrix{
public static void main(String[] args){
matrixAdd({{1;2}; {5;6}}; {{8;7}; {3;4};});}
public static double[][] matrixAdd(double m1[][], double m2[][]){
int i,j;
double sum[][];
for (i=1;i<=2;i++){
for(j=1;j<=2;j++){
sum[i][j]=m1[i][j]+m2[i][j];
}}
for (i=1;i<=2;i++){
for(j=1;j<=2;j++)
return sum[i][j];
}
}
}
I get this errors:
When must an Assured Equipment Grounding Conductor Program (AEGCP) be in place?
Select the best option.
At every worksite
Only when GFCIs are in place
Only when working around power lines
When an employer does not use GFCIs
Answer:
Only when working around power lines
Explanation:
Assured Equipment Grounding Conductor Program (AEGCP) is applicable mainly in sites dealing with power. Therefore, the most appropriate worksite to have Assured Equipment Grounding Conductor Program is when working around power lines.
Answer:
When an employer does not use GFCIs
Explanation: