1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tom [10]
4 years ago
5

30

Computers and Technology
1 answer:
xz_007 [3.2K]4 years ago
4 0

Oeer is the only one that can make you want it and don't want you for a new thing or you want it for the sake reason it is a good time for

You might be interested in
Python program
Serhud [2]

Answer:

The function in Python is as follows:

def search_file(filename,mystring):

my_dict = {}

count = 0

file = open(filename)

lines = file.readlines()

for line in lines:

 count+=1

 if mystring.lower() in line.lower():

  my_dict[count] = line.rstrip('\n')

return my_dict

Explanation:

This defines the function

def search_file(filename,mystring):

This initializes an empty dictionary

my_dict = {}

This initializes the number of lines to 0

count = 0

This opens the file

file = open(filename)

This reads the lines of the file

lines = file.readlines()

This iterates through the lines

for line in lines:

This increments the number line

 count+=1

This checks if the string exists in the line

 if mystring.lower() in line.lower():

If yes, the line number and the string are added to the dictionary

  my_dict[count] = line.rstrip('\n')

This returns the dictionary

return my_dict

7 0
3 years ago
You have one IP address provided from your ISP with a /30 mask. However, you have 300 users that need to access the Internet. Wh
DedPeter [7]

Answer:

A. PAT.

Explanation:

Based on the detail given the technology I will

basically use to help implement the solution will be PAT which full meaning is PORT ADDRESS TRANSLATION reason been that PAT is a technology that enables multiple users to have access to the internet and secondly PORT ADDRESS TRANSLATION (PAT) can often share one IP public address to multiple or different internet users at a time.

8 0
3 years ago
How does one select an entrepreneurial activity?
dem82 [27]
<span>Entrepreneurial activity is a human action with the goal of the generation of value, through the creation or expansion of economic activity. Several things must be taken into consideration before starting an </span><span>entrepreneurial activity but the most important is :
- the benefits it will give (financial but also personal , will you be satisfied doing that activity and will the activity bring financial benefits to you?
If yes, then you can do this activity.
</span>
6 0
4 years ago
In today's workplace, most employers issue a policy stating that they will monitor employees' use of any company-owned computer,
julia-pushkina [17]

<u>Organizations monitor, retain, and review employees emails:</u>

Today’s digital world most of business runs through employee emails. In an organization monitoring the email is most important event for security purpose and keep necessary backup so that it can be restore at any given point of time. If an organization is not monitor employee’s email system or server, then the organization is high risk.

As policy of an organization monitor employee’s email is must and watched carefully. Any important document is leaked or forwarded to wrong email address, then is high risk for an organization

As policy has to be drafted and signed by employee of an organization.

7 0
4 years ago
List the actual network numbers for each of these subnets. (If the list is longer than 16, simply list the first 3 and final 3 "
Andre45 [30]
69 is the answer because I know or it could be 430
3 0
3 years ago
Other questions:
  • Terry came into work and turned on his computer. During the boot process, the computer shut down. When he tried again, the compu
    14·1 answer
  • In tableData the column variable of the first column should be RowerNames, the second RowingEvent, the third RowerWeight and the
    6·1 answer
  • Sleeping is an effect of _______ , but agitation may cause a person to wake up
    7·2 answers
  • What does a server do? *
    11·1 answer
  • What two different types of encryption can be used by ipsec during data transfer?​?
    5·1 answer
  • Which design approach help build sites that optimize varied screen sizes
    5·1 answer
  • You are the owner of a computer component manufacturing company. Your manufacturing plant has 10 different machines that can be
    6·1 answer
  • Hands-On Project 15-4 Make Network Cables
    8·1 answer
  • Is it true or false 1-5
    13·1 answer
  • These are templates or patterns that make it easier for users to enter data
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!