1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pickupchik [31]
2 years ago
6

9.2 lesson practice ​

Computers and Technology
1 answer:
makvit [3.9K]2 years ago
5 0

Answer:

6 columns/items

Explanation:

<em>grid</em> starts off as an empty list ( [ ] ), so right now it has 0 items/columns.

After that, 3 new items ("frog", "cat", "hedgehog") have been appended to <em>grid</em>, it now has 3 items

Finally another 3 items are appended to <em>grid ("fish", "emu", "rooster"</em>), finally <em>grid</em> ends up with 6 items in total.

You might be interested in
A technology company only hires applicants who are under the age of 30. This company could face possibly _________ consequences
Black_prince [1.1K]
They could face legal consequences for discrimination. Hope this helps!
3 0
3 years ago
Read 2 more answers
Drivers should scan 10-12 secound down the road looking of potential hazards
Setler [38]
This statement is true.

Drivers should always scan the road ahead to check for any potential hazards so that they have enough time to safely avoid any dangerous situations. It is very important for a driver to be constantly scanning the road while driving to take in his or her surroundings.

Hope this answer helps! :)
8 0
3 years ago
What type of html list will automatically place a list marker, or bullet point, indicator in front of each item? group of answer
scZoUnD [109]

Main Answer:What type of html list will automatically place a list marker, or bullet point, indicator in front of each item? group of answer choices description l <u>unordered list</u>

Sub heading:

How many types of html list and explain?

Explanation:

1.There are three types

unordered list

ordered list

description list

2.unordered list: is used to group a set of related items in no particular order.

Reference link:

https://brainly.com

Hashtag:

#SPJ4

3 0
1 year ago
6, Answer the following questions.0<br>a What is software?​
nekit [7.7K]

Answer:

Software is a set of instructions, data or programs used to operate computers and execute specific tasks. Opposite of hardware, which describes the physical aspects of a computer, software is a generic term used to refer to applications, scripts and programs that run on a device. Software can be thought of as the variable part of a computer, and hardware the invariable part.

Software is often divided into categories. Application software refers to user-downloaded programs that fulfill a want or need. Examples of applications include office suites, database programs, web browsers, word processors, software development tools, image editors and communication platforms.

Explanation:

Software is a set of instructions, data or programs used to operate computers and execute specific tasks. Opposite of hardware, which describes the physical aspects of a computer, software is a generic term used to refer to applications, scripts and programs that run on a device. Software can be thought of as the variable part of a computer, and hardware the invariable part.

Software is often divided into categories. Application software refers to user-downloaded programs that fulfill a want or need. Examples of applications include office suites, database programs, web browsers, word processors, software development tools, image editors and communication platforms.

5 0
3 years ago
A threat analyst is asked about malicious code indicators. Which indicator allows the threat actor's backdoor to restart if the
joja [24]

Indicators of compromise enable system administrators and information security professionals to detect intrusion attempts or malicious activities.

Your information is incomplete as the options aren't provided. Therefore, an overview of indicators of compromise will be given.

Indicators of compromise means the pieces of forensic data that are found in files or system log entries to identify malicious activity on a network or system.

Indicators of compromise help IT and information security professionals to detect malware infections, data breaches, etc. Examples of indicators of <em>compromise</em> include log-in red flags, unusual outbound network traffic.

Read related link on:

brainly.com/question/25522987

8 0
2 years ago
Other questions:
  • A patient presents at an outpatient urgent care facility with an acute illness and is seen by a provider. A detailed history wit
    13·1 answer
  • The Internet and World Wide Web allow almost any business to be global. What are two important results of this process?
    8·1 answer
  • What is the purpose of exporting your public key to the directory services server?
    11·1 answer
  • Can someone help me with this one
    9·2 answers
  • Hosts A and B are communicating over a TCP connection, and Host B has already received from A all bytes up through byte 126. Sup
    10·1 answer
  • Write the definition of a function named printstarbucks that receives a non-negative integer n and prints a line consisting of n
    6·1 answer
  • Select the correct text in the passage. George is working as a lead team lead. Which statements correctly describes the skills t
    12·1 answer
  • Computers help eliminate the repetitiveness of manual tasks. How can this benefit you in your overall career?
    9·2 answers
  • True or False: Mapping annotations are exclusive - an annotated method will only be accessible to requests sent to a matching UR
    14·1 answer
  • What is closeable interface in java.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!