1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bagirrra123 [75]
3 years ago
5

D

Computers and Technology
1 answer:
kompoz [17]3 years ago
7 0

Answer:

The range function must have two parameters? False. ~Range has three possible sets of parameters: range(stop) - Returns 0 to the given stop value, counts by one.

Explanation:

You might be interested in
If u play codm pls tell me ur username
Nonamiya [84]

extremely bad game lol

5 0
3 years ago
Read 2 more answers
What are the features of G-mail <br><br>(Write in your own words)​
wlad13 [49]

Answer:

here is what I think!

Explanation:

G-mail is:

  1. secure
  2. easy to use
  3. fast
  4. can be used to sign in anywhere!<u>(including brainly)</u>
  5. you don't need to pay when creating one
  6. can help you in billing and buying apps and their paid product
  7. <em><u>you </u></em> can use it because <em>why no!</em>
  8. some websites need G-mail to be used

thats why you should use G-mail

tell me if you have an idea!

3 0
3 years ago
Read 2 more answers
Devising a plan to solve a problem or perform a task using a set of step by step instructions is called:
SCORPION-xisa [38]
D becaus ig is following INSTRUCTIONS
7 0
3 years ago
Which below is the correct definition of​ "war driving"? A. Eavesdroppers drive by buildings or park outside and try to intercep
katen-ka-za [31]

Answer:

B

Explanation:

War driving is the act of searching for WI-Fi networks from a moving vehicle. It involves slowly driving around an area with the goal of locating

8 0
4 years ago
What is the main differnace between piracy and hacking. please help and explane it in more than 200 words. A small essay would b
Elina [12.6K]

Answer:

Piracy is illegally copying and distributing content and, in most cases, making a profit off of each transaction. Hacking is the act of breaking down and through decurity measure to access information that would otherwise be inaccessible. Usually done for bragging rights as opposed to profit.

Explanation:

3 0
3 years ago
Other questions:
  • The distance at which wi-fi signals can travel ranges typically between ____ and ____.
    15·1 answer
  • I recently fixed my computer's hard drive, and when I rebooted my comp., the mouse and keyboard won't work. The keys work when i
    11·1 answer
  • Who is responsible for customer service?
    14·1 answer
  • The __________ level focuses on developing the ability and vision to perform complex, multidisciplinary activities and the skill
    9·1 answer
  • NEED HELP NOW WILL MARK BRAINLIEST 27 POINTS!!!!!!!!!!!!!!!!
    14·2 answers
  • Explain the difference between the legal protections a security officer enjoys and the legal protections a police officer receiv
    12·2 answers
  • Accepted identifier for a variable in PHP except:
    8·1 answer
  • Does anyone know what to do when brainly won't let you answer questions? I click on answer question and then it just sits there
    15·2 answers
  • Given all of the limitations of MBR, is it still relevant in current day use?
    15·1 answer
  • Lindsey also needs to calcite the commissions earned each month. If the company earns $200,000 or more in a month, the commissio
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!