Answer:
Talent Show Registration
Explanation:
Boolean is True or False so the only one that is true or false is Talent Show Registration as there is Yes and No
To work with dates, you need to import Group of answer choicesthe date class from the datetime modulethe date, time, and datetime classes from the datetime modulethe date and datetime classes from the datetime modulethe date class from the date module
Answer:
datetime.time
Explanation:
datetime.time is an idealized time that assumes there are 86,400 seconds per day with no leap seconds. This object stores the hour, minute, second, microsecond, and tzinfo (time zone)
Which type of digital storage stores information primarily on physical computer components in the photographer's possession?
O internal hard drive
O fireproof safe
O cloud storage
O optical storage
Answer:
Internal Hard Drive
Explanation:
Write a function called middle(string str) that returns a string containing the middle character in str if the length of str is odd, or the two middle characters if the length is even. Write the main that tests this function.
Answer:
Note: a) If the length of the string is odd there will be two middle characters.
Explanation:
b) If the length of the string is even there will be one middle character. There was a problem connecting to the server. Please check your connection and try running the trinket again.
2. What is the difference
between a folder and sub
folder
Answer:
In a computer file system, a subdirectory is a directory that is contained another directory, called a parent directory. A parent directory may have multiple subdirectories. In operating systems with a GUI such as Microsoft Windows, a directory is called a folder, and a subdirectory is called a subfolder.
write a letter to your future self :”Imagining a world in 2030”.Be sure to mention things that you think your future self would probably be doing and experiencing in daily life. You may include your hobbies, your surroundings, the role of AI in your life, etc.
To write a letter to your future self, follow the steps:
Start with an introduction in the first paragraph.The next is what you want your future self to know in the second paragraph.The last is conclusion in the third paragraph.What is a Letter?A letter is known to be a form of a written message that passes information from a person to another.
Note that by following the steps above, one can be able to write a letter to your future self.
Learn more about letter from
https://brainly.com/question/24140747
#SPJ1
This is an example of what type of formula?
=(D1+D17)
Question 2 options:
ADDITION
SUBTRACTION
RANGE
AVERAGE
Answer:
Average
Explanation:
The term 'average' refers to the 'middle' or 'central' point. When used in mathematics, the term refers to a number that is a typical representation of a group of numbers (or data set). Averages can be calculated in different ways - this page covers the mean, median and mode.
what is the name of the virus that appears to be a legitimate program but when opened, it can steal passwords or destroy data?
Answer: A Trojan Horse
Explanation: The name is based on the famous legend, where an army was granted access under the guise of being a safe and trustworthy entity.
Which data type does not allow duplicate values-python
A dictionary
B set
C tuple
D list
Answer:
Set
Explanation:
A set is unique in Python. It does not allow duplicates
Wen is a network engineer. He would like to isolate several systems belonging to the product development group from other systems on the network, without adding new hardware. What technology is best to use
Answer:
Virtual LAN (VLAN)
Explanation:
What can designers use multimedia authoring tools for?
Answer:
A. creating and editing video
briefly explain the emerging trends in micro computer technology according to size
Answer:
Emerging trends in IT include big data analytics, virtual and augmented reality, 5G, and the internet of things. Computer science workers can learn about computer science current events and new technologies by joining a professional organization.Mar 3, 2022
If a storage pool is configured as if it has more virtual storage than the physical drives actually offer, what feature is being used?.
The feature being used is thin provisioning.
How to solve level 53 on rapid router?
<img src=/static/game/image/actions/go.svg alt=' + ugettext(play= button)= += '= style=width: 4%;> ) def noPermissionMessage():
15. Question
What type of network address space allows for nodes on a network to communicate with each other,
but prevents any gateway router from forwarding traffic there, and are reserved for internal
networks?
58:1
Subnet mask
Non-routable address space
IP address
MAC address
Type here to search
O
A company sells computers only over the internet. Customers can decide their own computer configuration at the company's website and then place the order for the computer. This is an example of:
Answer:
This is an example of business to consumer e commerce
The critical components of the operating system that remain in memory as long as the computer is running are commonly known as the
Answer:
KERNEL
Explanation:
Q:
The critical components of the operating system that remain in memory as long as the computer is running are commonly known as the
A:
KERNEL
Select the correct answer.
Which task is a part of the analysis phase of the SDLC?
A.
installation
B.
coding
C.
planning
D.
testing
Answer: C. planning
Explanation:
Big Data _______________. Relies on the use of unstructured data imposes a structure on data when it is captured relies on the use of structured data captures data in whatever format it naturally exists
Answer:
captures data in whatever format it naturally exists
Explanation:
quizletBig Data _______________. Relies on the use of unstructured data imposes a structure on data when it is captured relies on the use of structured data captures data in whatever format it naturally exists
Compose an e-mail to your coworker Adam that describes how to add a photograph to a slide.
The ways to add a photograph to a slide is given below: What to write when composing the email is also given below.
How do you Insert photos into a slide?The steps are given below?\
The first thing to do is to open the slide you want to insert the image on.then click on Insert menu, and take the cursor to the Picture, and then one can click Photo Browser or insert pictures.Then select the picture that you want and and one can drag it onto the slide.Note that it is essential to follow the steps and one can add as many pictures as they want to their slides.
Learn more about e-mail from
https://brainly.com/question/24506250
#SPJ1
Darshan does a self-assessment of his entrepreneurial mindset. he finds that future orientation is a domain
that he wants to improve. what action should he take to improve this?
The action should he take to improve this is to spend time alone thinking of new ideas.
What is entrepreneurial mindset?This is known to be the way of thinking that helps a person to be able to get or attain their goals. Successful entrepreneurs embrace challenges, mistakes, and failure as opportunities to develop new skill sets to help them succeed in the future.
Note that the action should he take to improve this is to spend time alone thinking of new ideas as it will help him to finds that future orientation is a domain that he wants to improve.
Learn more about entrepreneurial mindset from
https://brainly.com/question/24642830
#SPJ1
If you have two folders open on your desktop and you want to move a file from one folder to the other, simply ________ the file
Answer:
copy
Explanation:
which type of shape allows you to add text that can be moved around, formatted with styles and effects, or grouped with other objects?
The shape which allows you to add text that can be moved around, formatted with styles and effects, or grouped with other objects is text box.
What is text box?Text box is the different shape box in which any text is written on the drawing area.
Text box in painting comes in many shapes as rectangle, rounded rectangle, circle, oval, thinking cloud, etc.
It can be moved around anywhere on the drawing area and formatted with different fonts and sizes.
Thus, text box is the shape allows to add text that can be moved around, formatted with styles and effects, or grouped with other objects.
Learn more about text box.
https://brainly.com/question/13812028?referrer=searchResults
#SPJ1
In what higher-order function do you apply a predicate to each value within a list, and if the predicate returns true, the value is added to an object
Answer:
Returning function
Explanation:
As functions are objects, we can also return a function from another function. In the below example, the create_adder function returns adder function.
Security is a major concern with m-commerce. How can m-commerce software ensure the security of transmissions and that the transaction is being made with the intended party
Answer:
Security in communication between applications and sites in m-commerce can use SSL technology.
Explanation:
While developing an app, developers have to perform several checks and ensure that the server has a legitimate certificate.
A text-editing application uses binary sequences to represent each of 210 different characters. What is the minimum number of bits needed to assign a unique bit sequence to each of the possible characters
Answer:
8
Explanation:
The minimum number of bits that one needs to give a unique bit sequence to each of the possible characters is 8.
The minimum number of bits that one needs to give a unique bit sequence to each of the possible characters is 8.
What are binary sequences?A binary sequence is known to be also called a bitstream. This is regarded as is a string of ones and zeros. The information in storage which can be in form of text message, a photograph, a song, a computer program, etc. may looks the same, like in a form or sequence of bits.
Historically, the most commonly used text code is the IRA or the International Reference Alphabet, in which each character in this code is represented by a unique 7-bit pattern. Since each character in this code is represented by a 7-bit binary code, there are 128 different characters that can be represented here.
The characters that are encoded with International Reference Alphabet, are always stored and transmitted using 8-bits per character, where the 8th bit is a parity bit mainly used for error detection.
Therefore, The minimum number of bits that one needs to give a unique bit sequence to each of the possible characters is 8.
Learn more about binary code on:
https://brainly.com/question/29792509
#SPJ2
Which of the following best describes the average amount of stored data per user for the first eight years of the application existence
The option that best describes the average amount of stored data per user for the first eight years of the application existence is memory.
What is RAM memory?The memory of a system is known to bee RAM which is Random Access Memory.
Conclusively, This is known to be a part of system hardware where operating system (OS), and data are saved. The option that best describes the average amount of stored data per user for the first eight years of the application existence is memory.
Learn more about data from
https://brainly.com/question/19243813
#SPJ1
When programmers work together, what is an example of how abstraction in programming can promote collaboration?.
Answer:
. When programmers work together, what is an example of an abstraction in programming that can promote collaboration?
Explanation:
answer choices Team members can rely on one another to explain their code. Programmers can write functions without needing ot know what they do or how they should work.
Why is it better to organize information using an array instead of simple variables
Explanation:
Arrays can hold multiple values. This means that if your array has the values of 'cat', 'dog', 'bird', you can access them easily by stating the location. For example, if I wanted to find 'cat' I would use: arrayName(0) and it would give me 'cat'. This is better than using individual variables because if you have a lot of values, creating variables for each value can be unorganized and very inefficient.
Answer: It reduces the amount of code used in the program.
Explanation:
PLS HURRY 100 POINTS
Complete the sentence about information censorship.
Many dictatorial governments only permit .____
1. GOVERNMENT SEARCH ENGINES
2. INDEPENDENT MEDIA
3. VIRTUAL PRIVATE MEETINGS
The correct option is A that many dictatorial governments only permit GOVERNMENT SEARCH ENGINES.
What do you mean by Government Search Engines?
The main website that is developed by the government in order do their work is Search.gov. This search engine currently support over 300 millions search queries.
These type of search engines are helpful for provide the service that are covered under the Jurisdiction Indian Government. Most of pages are automatically redirect us to these engines.
On the other hand, dictatorial is defined as the type of government under which one or more person possesses the power.
At last, search engines are used to find specialized data rapidly whereas web directory is used to find a list of different sites.
Therefore, correct option is A.
Learn more about Search engines, refer to the link:
https://brainly.com/question/27509068
#SPJ2
Answer:GOVERNMENT SEARCH ENGINES.
Explanation:
Which method would you use to get the value associated with a specific key and remove that key-value pair from the dictionary