1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Virty [35]
4 years ago
13

What is renewable energy

Computers and Technology
2 answers:
faust18 [17]4 years ago
8 0

Answer:

Energy that can be used over again

Explanation:

Examples include biofuel,hydroelectric power,and wind.

Monica [59]4 years ago
5 0
Energy that has the ability to be used over and over again
You might be interested in
If userA wants to send a secure message to userB using an asymmetric cryptographic algorithm, which key does userB use to decryp
ANTONII [103]

Answer:

userB will use his/her private key.

Explanation:

The steps involved in using asymmetric cryptographic algorithm are as follow:

1. Each user generates a pair of keys to be used for the encryption and decryption of messages.

2. Each user places one of the two keys in a public register or other accessible file. This is the public key. The companion key is kept private.

3. If UserA wishes to send a confidential message to UserB, UserA encrypts the message using UserB's public key.

4. When UserB receives the message, she decrypts it using her private key.

4 0
4 years ago
2. Write a program with a function that accepts a string as an argument and returns a copy of the string with the first characte
Oduvanchick [21]

Answer:

Following are the code to this question:

def capital(val):#defining a method that takes string value as parameter

   x=True#defining boolean variable

   r=''#defining string variable  

   for i in val:#defining loop to convert the first character into upper case

       if i.isalpha() and x:#defining condition to check input value is string

           r=r+i.upper()#change value into uppercase and hold value in r variable

           x=False#assign value false in boolean variable

       elif i=='.' or i=='?' or i=='!':#check symbols

           r=r+i#add value in r variable

           x=True#assign value True in boolean variable

       else:

           r=r+i#add all value in r variable

   return r#return r variable value

val=input()#input value in val variable

print(capital(val))#called the function which print the return value

Output:

please find the attachment.

Explanation:

  • In the above python program, a method "capital" is declared, which accepts a "val" a string value in its parameter, and inside the method one boolean "x" and one string "r" variable is used, in which r stores return value.
  • In the next step, for loop is declared, inside the loop, the conditional statement is used, in if the block it checks string value and converts the first character into upper case and assigns value false in the boolean variable.  
  • In the next step, elif block is defined that adds value in r variable and at the last, it will return function value, at the last step "val" variable is declared that input value from the user and pass into the method and print its return value.

4 0
3 years ago
How to get the blade out of a pencil sharpener?
agasfer [191]
Poke hole with thin but strong object
Or buy new sharpener
7 0
4 years ago
Your new client's AdWords account has one campaign with one ad group that contains a list of hundreds of keywords. Which best pr
Degger [83]
<span>Create new ad groups with related keywords grouped together</span>
8 0
3 years ago
________ is the actual speed of data transfer that is achieved and is always less than or equal to the data transfer rate. quest
bogdanovich [222]
The correct answer is B. A throughput refers to how much a data can be transmitted from a certain amount of time from one location to another. It is also used to measure the function of hard drives and internet connections.
3 0
4 years ago
Other questions:
  • ____ are specially denoted text or graphics on a web page, that, when clicked, open a web page containing related content.
    13·1 answer
  • Windows 7 is used to run ____ software
    5·2 answers
  • How to select the entire table in microsoft excel
    11·1 answer
  • The tools that cyber criminals often use, including computer viruses, worms, trojan horses and spyware, are called __________. q
    5·1 answer
  • For this assignment you must do the following tasks in order: (1) START EARLY. (2) READ THE ASSIGNMENT MULTIPLE TIMES to underst
    13·1 answer
  • Hard and soft skills can both be transferable skills. *<br><br> True<br><br> False
    5·2 answers
  • What icon is usually used to indicate an attachment feature?
    14·2 answers
  • Write code which takes a user input of a String and an integer. The code should print each letter of the String the number of ti
    12·1 answer
  • What was the strategy the company adopted for ERP implementation?
    12·1 answer
  • What can visible light and ultraviolet light do together
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!