1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anestetic [448]
4 years ago
5

In Python please.

Computers and Technology
1 answer:
Mazyrski [523]4 years ago
7 0

Answer:

I dont know a lot about that but i know how to skeeo, i am reallyu good at sleeping.

Explanation:

You might be interested in
Choose the correct answer base on the Components of Computer System
kondor19780726 [428]
1 - b - Excel is a computer program, so it'd be Software
2 - a - Process of elimination, haven't heard of the term 'peopleware' before.
3 - d - A joystick accepts input from a user to interact with a computer. ex. Flight Simulators
4 - c - A monitor will display (or output) an image based on what is received from the computer.
4 0
3 years ago
Which column and row references are updated when you copy the formula f$3/15
Tasya [4]

Answer: Column F

Explanation: In Microsoft excel, for the sake of robustness and to aid the effectiveness of updating formulas across cells. The reference of cells are treated as relative which means that when formulas are copied across columns or within rows, they get updated automatically. However, some numbers may be treated as constants such that we do not want them to change or be updated as we move acisss cells. Thus, such numbers are treated Given absolute references, which is made possible by adding a '$' prefix before the colum alphabet or row number or both. in the scenario given above, the row has the $ prefix, hence, it is absolute and will not change but the column alphabet does not and hence, treated as relative.

3 0
3 years ago
Which block cipher mode of operating requires that both the message sender and receiver access a counter that computes a new val
ankoles [38]

There is block cipher kind of mode of operation. The block cipher mode of operating requires that both the message sender and receiver  is exchanged is the (CTR) Counter.

<h3>What is the Counter (CTR)?</h3>

This is known to be a common block cipher mode of operation. It often needs that both the message sender and receiver to have a kind of access a counter, that helps to computes a new value whenever a ciphertext block is been exchanged.

The disadvantage of CTR is known to be the fact that it needs a synchronous counter necessary for both the sender and receiver.

Learn more about  block cipher mode from

brainly.com/question/9979590

7 0
2 years ago
. The BEST description of a proprietary database is one that
AVprozaik [17]
Is free to the public
8 0
4 years ago
Which of the following is not a SQL*Loader file?
MatroZZZ [7]

Answer:

D. Good file

Explanation:

SQL loader is responsible for loading data from files into the database. It needs the mandatory control file, bad file, log file and an optional discard file.

A. Bad file

This file shares its name with the data file and has .bad extension.

The bad file holds all the records which are rejected ( bad data ). If a bad file is not available, it is automatically created. The data is either rejected by the SQL loader or by Oracle itself. The rejected records are not placed in the data file and hence, have to be placed in the bad file.

It is mandatory to have a bad file for every data file.

B. Control file

This is a mandatory file. This is a text file needed by the SQL loader to perform the loading process.

It contains the information related to location of data, specifies the criteria for selecting data for insertion, location for inserting data, and the like.

C. Discard file

The discard file is created if the need arises. This is not a mandatory file to be present.

The data which is discarded and gets filtered out, is placed in the discard file.

The data is not inserted in the table because it does not matches the criteria for the data to be inserted.

This criteria is mentioned in the control file.

The data is discarded only due to the mismatch and not because it is rejected or is bad data.

E. Log file

This file is mandatory to the execution. In absence of log file, the loader does not proceeds with execution and gets terminated.

In the beginning of the execution, a log file must be created by the loader. This file contains all the information regarding the data loading and also the errors encountered during the loading process.

6 0
3 years ago
Other questions:
  • Technology progresses so new needs can be satisfied.<br><br> A. true<br><br> B. false
    12·2 answers
  • According to ________ law, in a sealed chamber, the pressure and temperature of a gas are directly related to each other.
    10·1 answer
  • A certain database has numerous tables, but they do not share any fields in common. this database will not be as powerful as oth
    15·2 answers
  • printLarger is a method that accepts two int arguments and returns no value. Two int variables, sales1 and sales2, have already
    11·1 answer
  • Counter-controlled repetition is also known as:
    8·1 answer
  • I need help!
    14·1 answer
  • In a __________, you are trying to find what others have prepared. With __________, you are trying to discover new patterns that
    8·1 answer
  • Write a program to find the product of 3 numbers
    8·2 answers
  • Write a pseudocode algorithm that prompts the user to enter a three-digit number and outputs the hundreds, tens and units.
    6·1 answer
  • Data elements in a relational database are organized into ____
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!