1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pochemuha
3 years ago
13

Im sad cheer me up please

Computers and Technology
2 answers:
SSSSS [86.1K]3 years ago
5 0

Answer:

Don't worry !! Everything will be fine

Explanation:

lawyer [7]3 years ago
3 0

Answer:

don't be sad I am sorry you are sad

You might be interested in
Does anyone know any nitro type hack??
alexgriva [62]

Answer:

yes nitro hack is where they time your hacking skills

5 0
4 years ago
Read 2 more answers
Define a function below called nested_list_string. The function should take a single argument, a list of lists of numbers. Compl
DerKrebs [107]

Answer:

The solution code is written in Python:

  1. def nested_list_string(list2D):
  2.    output = ""
  3.    for i in range(0, len(list2D)):
  4.        for j in range(0, len(list2D[i])):
  5.            output += str(list2D[i][j]) + " "
  6.    
  7.    return output  

Explanation:

Let's create a function and name it as nested_list_string() with one input parameter, list2D (Line 1).

Since our expected final output is a string of number and therefore we define a variable, <em>output</em>, to hold the string (Line 2).

Next use two for loops to traverse every number in the list and convert each of the number to string using <em>str()</em> method. Join each of individual string number to the output (Line 3-5).

At the end, we return the output (Line 7)

8 0
4 years ago
Why can’t a computer use source code
Elina [12.6K]

Answer:

A computer can use a source code

Explanation:

The code that was copied

gets compiled by the terminal and

gets its traced erased

therefore there is no need to give

credit and code still used in proccess

Example:

You can get a source code from stackoverflow

github, you can use that code to build your website

giving no credit to the owners of that code

the code will get its traced erased by the compiler

5 0
3 years ago
Read 2 more answers
What common variation of the Server Message Block (SMB) sharing protocol is considered to be a dialect of SMB?
ser-zykov [4K]

Answer:

Common Internet File System

Explanation:

Given that the Server Message Block (SMB) has various types or variations. The most common variation of this Server Message Block sharing protocol that is considered to be a dialect of SMB is known as "Common Internet File System." This is known to serve as a form of a communication protocol for giving shared access to different outlets between nodes on a network.

Hence, in this case, the correct answer is "Common Internet File System"

8 0
3 years ago
What are several different types of software, which sit in the middle of and provide connectivity between two or more software a
brilliants [131]

Answer:

The answer to the given question is the option "a".

Explanation:

In this question, the answer is "middleware" software because this software works between the operating system and the applications that provide connectivity to two or more software applications. for example database, application server, etc and other choices that are not correct can be described as:

  • In option b, The integration middle wear represents the software of the system. It does not coordinate between operating and application software.
  • In option c, It is used to manage the data and the information for the process.
  • In option d, It includes the hardware, software and the networks. In this hardware and software link for use software.

That's why the answer to this question is the option "a".

6 0
3 years ago
Other questions:
  • What seems to be the prevailing opinion about enterprise clouds?
    8·2 answers
  • How should you decide what to wear to an interview? What kind of things should be considered?
    5·1 answer
  • Which of these are examples of skills?
    5·2 answers
  • Technician A says underinflation of a tire causes excessive one-sided wear on one side of the tread. Technician B says overinfla
    11·2 answers
  • A column to be used in a database is called the
    8·1 answer
  • What does limited access to a document mean? A. It makes a document inaccessible without a password. B. It enables a person to m
    7·1 answer
  • Can someone please answer these questions! Thank you :)
    5·1 answer
  • Which statement describes Augmented Reality (AR) technology?
    12·1 answer
  • Which validation check can be used on the following data. "XX000" 
    9·1 answer
  • Complex scientific research is usually done using?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!