1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shepuryov [24]
2 years ago
6

Suppose we have the list: list = [1,2,3,4,5,6]

Computers and Technology
1 answer:
mixer [17]2 years ago
6 0
1, 2, 3, 10, 5, 6 is the answer
You might be interested in
What is the most used piece of technology in education?
Anna11 [10]
I would say a computer, in this time and age everyone uses laptops, computers, chrome books for education
4 0
3 years ago
What is looping in QBASIC​
Elden [556K]

A looping is a set of instructions which is repeated a certain number of times until a condition is met. hlo dai k xa halkhabar

3 0
3 years ago
What are the pros and cons for E-trade?
Bezzdna [24]

Answer:

Pros                                            Cons

• Free stock and ETF trading • Higher fees for non-free mutual funds

• Some mutual funds and bonds are free

• Low non-trading fees

3 0
3 years ago
Read 2 more answers
HELP MEEE PLEASE!!!
Vladimir [108]

Answer:

b goes with 1 c goes with 3 and a goes with 2

Explanation:

3 0
3 years ago
Alex recently earned his security certification and has been offered a promotion to a position that requires him to analyze and
nikitadnepr [17]

Alex recently earned his security certification and has been offered a promotion to a position that requires him to analyze and design security solutions as well as identifying users’ needs.Alex been offered

A.Security administrator

Explanation:

  • A security systems administrator handles all aspects of information security and protects the virtual data resources of a company.
  • They are responsible for desktop, mobile, and network security, and are also responsible for installing, administering and troubleshooting an organization's security solutions.
  • A security administrator is the point person for a cybersecurity team.
  • A Security Administrator installs, administers, and troubleshoots an organization's security solutions.
  • The Security Administrator will ensure the network's security, protect against unauthorized access, modification, or destruction, and troubleshoot any access problems

3 0
4 years ago
Other questions:
  • A bunch of computer scientists take over an island and start their own country. They want the license plates to use binary numbe
    11·1 answer
  • Which of the following is a valid format symbol in Microsoft Excel? Dollar Sign, Comma, Percent Sign or all of them? I can't fig
    14·1 answer
  • What is the maximum transmission speed for bluetooth v3 and v4 devices?
    12·1 answer
  • Write the equivalent c++ expression for the following algebraic expressions
    11·1 answer
  • For most applications, saving sound files at the _____ bit resolution provides a good balance of sound quality and file size.
    15·2 answers
  • Blank determines the overall brightness or darkness of an entire image
    5·1 answer
  • ___________ is a computer programming language.
    9·2 answers
  • In Linux, users are internally represented using a unique number called user ID or uid.
    9·1 answer
  • Multiple Choice
    9·1 answer
  • ____ is an example of a set of prewritten classes that allows you to access data stored in a database.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!