1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mekhanik [1.2K]
3 years ago
13

What is "social

Computers and Technology
2 answers:
mihalych1998 [28]3 years ago
5 0

Answer:

<h2>A. When you compare your social life to others' social</h2><h2>life...........</h2>

Afina-wow [57]3 years ago
4 0

Answer:

A. When you compare your social life to others.

You might be interested in
Latent data is which of the following?
Levart [38]
Generally invisible to the user, like you can't see it on your OS or in just a standard application
8 0
3 years ago
Read 2 more answers
A triangular number is a number that is the sum of the integers from 1 to some integer n. Thus 1 is a triangular number because
neonofarm [45]

Answer:

  1. m = 3
  2. n = 20
  3. triList = []
  4. current = 0
  5. for i in range(1, n + 1):
  6.    current = current + i  
  7.    if(current >= m and current <= n):
  8.        triList.append(current)
  9. print(triList)

Explanation:

The solution code is written in Python 3.

Firstly, create variable m and n and set the value 3 and 20 to the variables (Line 1 -2)

Create a triangle number list (Line 4)  and another variable current to hold the value of current total of triangle number (Line 5).

Create a for loop and iterate through the number between m and n (Line 6).  Calculate the current total of triangle number (Line 7) and proceed to check if the current triangle number is bigger or equal to m and smaller and equal to n, add the current triangle number to triList (Line 8-9).

Print the triList (Line 11) and we shall get [3, 6, 10, 15]

4 0
3 years ago
B. Earthquake Warnings
Vedmedyk [2.9K]

Answer:

idu

Explanation:

4 0
3 years ago
Encryption is the process of:
Tanya [424]

Answer:

b.

Explanation:

disguising is a bit of a misleading term here. But basically, yeah, you're replacing one message by an 'encrypted' message, using mathematical rules. To reconstruct the original message, you'll need some key data and the inverse mathematical rules.

6 0
4 years ago
Software licensed as proprietary
steposvetlana [31]

Answer:

Does not permit source code changes.

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • If you feel that an OSHA inspection is needed to get hazards corrected at your workplace, which is your best option?
    7·1 answer
  • In which encryption strategy is the plaintext encrypted one character at a time and each encrypted character depends on that sin
    14·1 answer
  • What term identifies the physical interface between a computer and its peripherals?
    5·1 answer
  • . Convert BAC4 from hexadecimal to decimal. Show your work.
    9·1 answer
  • ____ is an approach to boundary spanning which results from using sophisticated software to search through large amounts of inte
    5·1 answer
  • Write a program that computes the minimum, maximum, average and standard deviation of the population over time for a borough (en
    6·1 answer
  • What is the name of the file manager in Microsoft Windows?​
    5·1 answer
  • The formula for the trajectory of a ball is given by f(x)=xtanθ−12v20gx2cos2θ+y0 where x is a coordinate along the ground, g=9.8
    10·1 answer
  • ¿En qué situaciones puedo utilizar formato condicional?
    10·1 answer
  • What's wrong with my program? Here is my code , if the user wants a 3rd card dealt they, have to select yes and the total will b
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!