1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kamila [148]
3 years ago
8

What are some examples of environmental technology

Computers and Technology
1 answer:
Zarrin [17]3 years ago
3 0
Some examples of environmental technology is recycling.
You might be interested in
Business Professionals of America, and Future Business Leaders of America – Phi Beta Lambda are both open to business students a
AVprozaik [17]

Answer:

Middle, High and College

Explanation:

8 0
4 years ago
Read 2 more answers
You are the project manager tasked to implement a critical application in a reputed bank. A client review indicates that you cou
Oksana_A [137]
Hiring based on unbais form
6 0
3 years ago
What is elif? How does it work in python?
pav-90 [236]
It is the condition used after the if condition. say you use the if condition and you need to add another outcome, instead of using the if condition again, you’d use elif and end it with the else command.

example:

if num == 10:
print (“correct”)

elif num > 10:
print (“too high”)

else:
print (”too low”)

hope this helps :]
5 0
3 years ago
Read 2 more answers
A threat actor has successfully breached the network firewall without being detected by the IDS system. What condition describes
Mamont248 [21]

Answer:

false negative

Explanation:

A false negative is a dangerous state in which the IDS (Intrusion Detection System) assumes the activity as acceptable in which the activity is actually an attack occurred on the system.

That means, the Intrusion Detection System has failed to catch the attack. This is the most dangerous state, as the systems were compromised and the network or cyber security people were unable to find the attack.

More generally, there are two types of Intrusion Detection Systems ( IDS ). Network based IDSs ( NIDS ) and Host based IDSs ( HIDS ).

5 0
4 years ago
Write a function called simulate_several_key_strikes. It should take one argument: an integer specifying the number of key strik
Furkat [3]

Answer:

The solution code is written in Python 3

  1. import random
  2. import string
  3. def simulate_several_key_strikes(l):
  4.    char_set = string.ascii_lowercase
  5.    return ''.join(random.choice(char_set) for i in range(l))
  6. print (simulate_several_key_strikes(10))

Explanation:

The program is aimed to generate random characters and the number of characters generated is dependent on user input. Hence, we will need to import the random module (Line 1). We also import string module so that we can make use of its associated method to generate English letters (Line 2)

Next, we create the function simulate_several_key_strikes that takes one single parameter, l, as input. Within the function body, we use ascii_lowercase method to generate the lowercase letter set and assign it to char_set variable (Line 5). We use random.choice method to randomly pick one of the letter in char_set and join it with an empty string (Line 6). Please note there is a for-loop that will repeatedly generate l-number of character and eventually return it as output.

We test the function by passing 10 as input parameter and we shall get a sample output as follows:

xuiczuskoj

7 0
3 years ago
Other questions:
  • Write a program that lets a user enter N and that outputs N! (N factorial, meaning N*(N-1)*(N-2)*..\.\*2*1). Hint: Initialize a
    5·1 answer
  • Presentation guidelines state that slides should have no more than bullet points.
    9·2 answers
  • What is a thesaurus is best used for​
    11·2 answers
  • What is a GUI?
    11·1 answer
  • Which type(s) of license(s) allow the underlying software code to be viewed?
    15·1 answer
  • How to generate random numbers in excel without duplicates
    7·1 answer
  • Cathy designed a website for a cereal brand. When users view the website, their eyes first fall on the brand name, then they vie
    14·1 answer
  • ____ can be used to break continuous text to one or more sentences​
    7·1 answer
  • Why the computer is known as versatile and diligent device ? explain.<br>​
    15·1 answer
  • As a hardware technician and knowing the internet components of the system unit, list any five(5) of such components.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!