1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Reptile [31]
4 years ago
7

Controlled intersections use some form of which of the following:

Computers and Technology
1 answer:
Genrish500 [490]4 years ago
7 0
A.all of the above it is correct 
You might be interested in
Automate theory can be considered as science or art???
amm1812
I would say it is considered as science and a bit of maths as its the 'study of abstract machines and automata'
7 0
4 years ago
Read 2 more answers
The readline method reads text until an end of line symbol is encountered, how is an end of line character represented
zhannawk [14.2K]

Answer:

\n

Explanation:

readline() method is used to read one line from a file. It returns that line from the file.    

This line from the file is returned as a string. This string contains a \n at the end which is called a new line character.

So the readline method reads text until an end of line symbol is encountered, and this end of line character is represented by \n.

For example if the file "abc.txt" contains the lines:

Welcome to abc file.

This file is for demonstrating how read line works.

Consider the following code:

f = open("abc.txt", "r")  #opens the file in read mode

print(f.readline()) # read one line from file and displays it

The output is:

Welcome to abc file.    

The readline() method reads one line and the print method displays that line.                        

3 0
3 years ago
You try to enter your name into a cell that accepts a numeric value. What error would you receive? A. #NAME B. #VALUE C. #REF D.
UNO [17]

Answer:

<h2>Option B: #VALUE</h2>

is the correct answer.

Explanation:

<h3>Reasons of #VALUE error:</h3>
  • When cells are not given the expected type of value.
  • If cells are left blank unnoticeable or for giving a null value.
  • For entering dates and other numerical data in text form.
<h3>Correcting and fixing #VALUE error:</h3>

This type of error can only be fixed by finding the cell in which there is wrong data entered and correct it.

Fixing the #VALUE error is tricky as some functions automatically ignore the data that is invalid.

<h3>EXAMPLE:</h3>
  • Suppose a cell contains the value as cost of the object and in order to make it 0, NA is inserted into the cell.
  • While making total of all the costs, that particular cell might cause #VALUE error.
  • Following image attach will help you clear the concept.

I hope it will help you!

4 0
3 years ago
Read 2 more answers
Which of the following are good backup methods you can use to protect important files and folders from loss in the case of a har
grigory [225]

Answer:A,B, and D

Explanation:

6 0
3 years ago
Read 2 more answers
Generally considered to be the most important information security policies, what item below defines the actions a user may perf
tamaranim1 [39]

Answer:

A. Acceptable use policies

Explanation:

These specific actions that the user may perform are all described in the acceptable use policy. The company usually requires that the user read and sign this policy before being granted a network ID into the system itself. By signing this agreement the individual user agrees to perform ONLY the actions listed in the agreement and nothing else and are restricted from unauthorized areas.

3 0
4 years ago
Other questions:
  • By default, which of these traffic source dimensions does google analytics capture for each user that visits your website?
    8·1 answer
  • Which access object(s may be used when creating a lookup field to select valu?
    8·1 answer
  • Select four programs that make up system software.Select four programs that make up system software.
    8·1 answer
  • In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server
    6·1 answer
  • ) What is the ""Phantom Inspector""? (
    12·1 answer
  • How does the text recommend that a company operate if it wants to be successful in the information age?
    11·1 answer
  • Giải thích mục đích của các thao tác open() và close().
    6·2 answers
  • Which of the following is one of the first steps in implementing a comprehensive security program? Setting up a Guest account Cr
    14·1 answer
  • Create a basic program that accomplishes the following requirements: Allows the user to input 2 number , a starting number x and
    12·1 answer
  • What is analog computer? where is it used​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!