1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iVinArrow [24]
3 years ago
14

What was the second phone?

Computers and Technology
1 answer:
ivanzaharov [21]3 years ago
7 0
What is the question for !!!!!!!!!!!!
You might be interested in
The use of computers in education is referred to as computer assisted instruction (CAI). Write a program that will help an eleme
dybincka [34]
I don't think some will write the whole program here, but which part are you having trouble with?
6 0
4 years ago
What is the output? answer = "Hi mom print(answer.lower()) I​
DerKrebs [107]
As you have included a syntax error inside your question, I will make assumptions on the code. I will assume your code is {
answer = “Hi mom”
print(answer.lower())
}

In this case the output would be “hi mom”. Please make sure to double check your questions before posting.
3 0
3 years ago
What is one property of a good hash code?
larisa [96]

Answer:- Major property of a good hash code is that objects which are equal should return the same hash code .

Explanation: Hash codes is a numeric value which  is used for identify a object while a equality testing .Hash code can occupy the value of any length and then returns a fixed length value. The value of hash codes are variable.

If two objects are equal then by the method of equal(object) if the hashcode() function is called on both the objects , they produce the same value.

8 0
4 years ago
Which method is useful for dimensionality reduction especially for small data-sets?
Anna [14]
Independent Component Analysis (ICA) is based on information-theory and is also one of the most widely used dimensionality reduction techniques.
8 0
3 years ago
PLEASE HELP ASAP!!
inn [45]
The answer is encryption

steganography would be hiding data, like in an image
digital forensics is the analysis done after an attack
and the last one is a security standard
6 0
3 years ago
Other questions:
  • The ______ identifies the path for the currently open folder
    8·2 answers
  • How can you find Web pages that contain news published during the past week?
    8·1 answer
  • Which of the following is not part of active listening?
    6·2 answers
  • A security administrator wants to empty the DNS cache after a suspected attack that may have corrupted the DNS server. The serve
    12·1 answer
  • Leo noticed that attackers have breached his wireless network. They seem to have used a brute-force attack on the WiFi protected
    13·1 answer
  • Remember partially filled arrays where the number of elements stored in the array can be less than its capacity (the maximum num
    14·1 answer
  • Vegetable farming is a good source of income explain this statement<br>​
    5·1 answer
  • 1.Which one of the following buttons returns a window to its original size?
    11·1 answer
  • The math function ceil(x) returns the smallest integer that is greater than or equal to x. True False
    12·1 answer
  • How does accenture generate value for clients through agile and devops?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!