1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irga5000 [103]
2 years ago
10

What is the output? >>> answer = "five times" >>> answer[2:7]

Computers and Technology
1 answer:
Nina [5.8K]2 years ago
3 0

The output  is The string answer = "five times" All strings start at index 0 and end at the length of the string minus 1.

<h3>What is output?</h3>

Other answer are:

Then count rightly, index 2 is v and index 7 is  m answer[2:7] goes from v to m including v but not m, So, answer[2:7] = "ve ti".

Output is said to be the act of making something out of another thing.

Note that the output  is The string answer = "five times" All strings start at index 0 and end at the length of the string minus 1. Then count rightly, index 2 is v and index 7 is  m answer[2:7] goes from v to m including v but not m, So, answer[2:7] = "ve ti".

Learn more about output from

brainly.com/question/1786465

#SPJ1

You might be interested in
How has information technology made piracy possible?
inna [77]
Easy access to burner and "free"  Downloads off the internet
4 0
4 years ago
In a DTP project, Fiona is looking for a way to make a page layout attractive to readers. Help Fiona pick the correct word to co
Jlenok [28]

You’ll need a(n)  a block of bold text to capture the attention of your audience.

<h3>How do you make text bold in pages?</h3>

First one need to select Format  and then Font and then Bold.

Note that  by bolding a selected text, it can capture the mind of the people to the page layout.

Hence, You’ll need a(n)  a block of bold text to capture the attention of your audience.

Learn more about  page layout  from

brainly.com/question/12129748

#SPJ1

8 0
2 years ago
Write a balanced half-reaction for the oxidation of manganese ion Mn+2 to permanganate ion MnO−4 in acidic aqueous solution. Be
jeka57 [31]

Answer:

The complete reaction is given in the image attached below for better understanding and elaboration

4 0
3 years ago
Bob is having no luck performing a penetration test on Retail Store's network. He is running the test from home and has download
Novosadov [1.4K]

Incomplete question. The full question read;

Why is Jim having these problems?

Options:

A. Security scanners are not designed to do testing through a firewall.

B. Security scanners cannot perform vulnerability linkage.

C. Security scanners are only as smart as their database and cannot find unpublished vulnerabilities.

D. All of the above.

Answer:

<u>D. All of the above.</u>

Explanation:

<em>Remember, </em><u>security scanners</u> are only designed to <em>gather</em> information about a network, but not with the ability to perform firewall testing. Also, these security scanners are pre-programmed with existing vulnerabilities in their database, and so it would impossible to discover vulnerabilities on the Retail store's network.

Hence, since Bob is using the wrong tools, he is unsuccessful in performing a penetration test.

3 0
3 years ago
question 2 which data link layer protocol defines the process by which lan devices interface with upper network layer protocols?
erma4kov [3.2K]

The correct answer is MAC (Media Access Control).

<h3>What is MAC?</h3>

The Media Access Control (MAC) protocol is a data link layer protocol that defines the process by which local area network (LAN) devices interface with upper network layer protocols, such as the Internet Protocol (IP).

The MAC protocol is responsible for controlling access to the shared communication medium of the LAN and for providing a reliable link between devices on the LAN. It does this by defining a set of rules and procedures for how devices on the LAN can detect and avoid collisions when transmitting data, as well as for how they can recover from errors that may occur during transmission.

The MAC protocol is typically implemented in hardware, such as in the network interface controller (NIC) of a computer, and is an essential part of the LAN communication process.

To Know More About MAC, Check Out

brainly.com/question/29388563

#SPJ1

6 0
2 years ago
Other questions:
  • Which of these tools can best be used as a self assessment for career planning purposes
    12·1 answer
  • Explain Spreadsheet and its Basics
    13·1 answer
  • Which two pieces of information must be provided when saving a file for the first time in Wordpad?____.
    8·1 answer
  • If you want to code a method that can only be called from the class that the method is in, you code ____________________ as the
    15·2 answers
  • Why is it NOT a good practice to save everything on the desktop?
    6·2 answers
  • Where will the append() function add a new element to a list? A. At the end of the list B. At the beginning of the list C. In th
    10·1 answer
  • Which role involves designing and creating advertisements for marketing purposes?
    14·1 answer
  • Why can i go to discord if my school blocks it-
    9·1 answer
  • Distinguish<br> between formal and Informal<br> Information System<br> Information systems
    13·1 answer
  • Digital Print Project
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!