1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
antiseptic1488 [7]
3 years ago
9

What bug was supposed to start affecting computers on january 1 2000

Computers and Technology
1 answer:
horsena [70]3 years ago
5 0

Answer: Y2K bug, also called Year 2000 bug or Millennium Bug

You might be interested in
Matts has finished running some security automation scripts on three newly deployed Linux servers. After applying intrusion dete
gizmo_the_mogwai [7]

Answer: CPU

Explanation:

The management dashboard refers to the tool that's used in the presentation of the vital k management KPIs in a single place, which is efficiently managed in order to make faster and better decisions.

Based on the information given, after the application of intrusion detection, virus, and malware protection on the Linux images, he will notices an increase in CPU on his server management dashboard.

Therefore, the correct option is C.

5 0
3 years ago
For this problem, you will write a function standard_deviation that takes a list whose elements are numbers (they may be floats
Evgesh-ka [11]

Answer:

  1. import math  
  2. def standard_deviation(aList):
  3.    sum = 0
  4.    for x in aList:
  5.        sum += x  
  6.    
  7.    mean = sum / float(len(aList))
  8.    sumDe = 0
  9.    for x in aList:
  10.        sumDe += (x - mean) * (x - mean)
  11.    
  12.    variance = sumDe / float(len(aList))
  13.    SD = math.sqrt(variance)
  14.    return SD  
  15. print(standard_deviation([3,6, 7, 9, 12, 17]))

Explanation:

The solution code is written in Python 3.

Firstly, we need to import math module (Line 1).

Next, create a function standard_deviation that takes one input parameter, which is a list (Line 3). In the function, calculate the mean for the value in the input list (Line 4-8). Next, use the mean to calculate the variance (Line 10-15). Next, use sqrt method from math module to get the square root of variance and this will result in standard deviation (Line 16). At last, return the standard deviation (Line 18).

We can test the function using a sample list (Line 20) and we shall get 4.509249752822894

If we pass an empty list, a ZeroDivisionError exception will be raised.

3 0
3 years ago
Anchor hyperlink to position the cursor to the section called sisters? i need a code pls
enot [183]

use an anchor tag(<a>This is an anchor tag</a>) and use the href attribute and set it's destination to the section element who's id or class is "sisters".



Example:

<a href="#Sisters">Click Here!</a>

then you can add this somewhere on the document.

<section id="Sisters">Hello World!</section>

7 0
3 years ago
What is the term used for the initial document that includes the necessary information to build a game?
arlik [135]

Game design document is the term used for the initial document that includes the necessary information to build a game

Explanation:

A game design document serves as a nexus and core to combine and list all features of a game. It consists of written descriptions, images, graphs, charts and lists of data relevant to specific parts of improvement, and is usually formed by what characteristics will be in the game, and sets out how they will all fit together.

Creating a GDD will assist the team's designer in knowing what the fragrance of the game is and the intended range of its overarching world. Holding all the game factors in one well-organized document will help the designer easily communicate their idea to the rest of the team, and also healing to pinpoint deficiencies or missing components of the game. The GDD should serve as your master checklist.

4 0
3 years ago
Which of the following is not a type of bank? A.Credit Union B.Online Bank C.Payday Lender D.Retail Bank
Damm [24]
C. a payday lender is a type of loan
7 0
3 years ago
Other questions:
  • Credit card numbers follow a standard system. For example, Visa, MasterCard, and Discpver Card all have 16 digits, and the first
    11·1 answer
  • A style manual can be described as
    11·2 answers
  • The vast amount of data collected from Internet searches, social media posts, customer transactions, military
    8·1 answer
  • Which of the following is the most compelling
    8·2 answers
  • . List 5 types of exploits from cybercrime and provide brief definition. (2.5 Marks)
    5·1 answer
  • The gene form of a trait is called a(n) ​
    10·1 answer
  • How do you change your grade level
    10·1 answer
  • SOMEONE PLEASE HELP ME WITH THIS ILL GIVE YOU BRAINLY IF YOU GET IT RIGHT PLEASE!!!!!
    13·2 answers
  • 4. When working at the CLI in Linux, you specify the exact location of a file, which is the ____________________ to it, by begin
    13·1 answer
  • Why is it important for the scrum master to help the team focus on daily and iteration goals\
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!