1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Artist 52 [7]
2 years ago
13

Write a function expand_string(a, pre, suf, num) that takes the parameters a,pre,sub and num appends the prefix pre, and suffux

suf to the string a num times and returns the new extended string. Input: a=test, pre=pr, suf=su, num=2. Output: prprtestsusu. In Pyrhon, please. ​
Computers and Technology
1 answer:
kramer2 years ago
7 0

Answer:99

Explanation:88

You might be interested in
Which statement about routers is !!!FALSE!!!
monitta

Answer:

b. they are located at the intersections of the network of wires and cables that make up the internet.

Explanation:

Given that Router is a computer networking device that operates by transferring data packets between computer networks, while also ensuring traffic organizing tasks on the Internet.

Hence, Routers put packets in the right order after they arrive at their destination by matching the destination IP address of the packet and one of the addresses in the routing table.

Also, Routers check the address on each packet that arrives and decide which way it should go next​ by ensuring the data packets are summarized for the outgoing interface recorded in the table entry.

Therefore, the correct answer is option B

8 0
3 years ago
What precautions should be taken to make a computer more secure ​
Sergeeva-Olga [200]

Answer:

To make a computer more secure

Explanation:

we have following ways :

1)we should have anti virus to protect our computer.

2)we should not play or look computer for a long time because it destroy our files

4 0
3 years ago
What information will you find in the 16-bit field in an IP datagram?
faust18 [17]

Answer: This 16-bit field defines the entire packet size in bytes, including header and data. The minimum size is 20 bytes (header without data) and the maximum is 65,535 bytes. All hosts are required to be able to reassemble datagrams of size up to 576 bytes, but most modern hosts handle much larger packets.

Explanation: Hopefully this helps you with what ever u are doing.

7 0
3 years ago
Plz I’ll mark Brainliest
artcher [175]

Answer:

It's B cuz if somehow the power went off your work won't be saved. So it's best to save your work frequently.

6 0
3 years ago
Just five types of pointing device,list
posledela

Answer:

five types of pointing devices

Explanation:

Ponting devices

Pointing means point something and the pointing devices are the input /peripheral devices those are used to point the pointer on the screen. We do move cursor on the screen to open the files or any icon.

There are many types of pointing devices but these are quite common which are given below

  1. Computer mouse
  2. Finger on touch screen.
  3. Joystick.
  4. Leap Motion.
  5. Light pen (pen)

1.Mouse

Mouse is most common type of input device that is used for pointing the data on the screen. We press it with our hands and keep pointing the things.

There are three types of mouse

  1. optical mouse
  2. wireless mouse
  3. trackball mouse.

2. Finger on touch screen

In this type of movement the fingers are input devices those we use to see the movement of pointer on the screen and this is most common in this century.

3.Joystick.

Joystick is another input device to point the cursor but it is mostly used in games. Children can use it smartly so it is inculcated in games usually.

4. Leap Motion

The Leap Motion (LM) controller is a latest 3D sensing device for hand posture interaction with a computer. It is having the capability sense the location of the fingers of the hands, as well as the palm position.

5.Light Pen

this is another pointing device which is mostly used to highlight and select the data on the screen.

Note: All of these above pointing devices are most common used now a days. These devices are having new  conventions day by day for the ease of user. This era is basically the era of IT ,so the use of computer must be so easy and conventional for the user so, the innovations and improvement in such devices is made side by side.

3 0
3 years ago
Other questions:
  • Write a note on secondary storage​
    14·1 answer
  • Nonverbal communication relies on _________________. a. multiple channels b. continuous feedback c. ambiguous interpretation d.
    9·1 answer
  • The US government takes the protection of patients' private information very seriously. In 1996, went into effect. This law prot
    14·1 answer
  • List and briefly defined categories of security services.
    8·1 answer
  • Brainliest to Best Answer!
    6·1 answer
  • Which of these is a sign of healthy A)very high inflation B)A rise in consumers spending C)a shift supply of essential goods D)H
    7·2 answers
  • Which of the following describes an iteration in a computer program?
    8·1 answer
  • Which language is written using 0s and 1S​
    11·1 answer
  • Can you please help me?
    6·1 answer
  • How do you take a picture on an apple computers
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!