1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mihalych1998 [28]
3 years ago
5

HELP!! WHATS THE ANSWER??

Computers and Technology
2 answers:
dsp733 years ago
6 0

Answer:

"sing" that is the answer

Explanation:

tangare [24]3 years ago
6 0

Answer:

B. "Sing"

Hope this helps!

You might be interested in
Two files named numbers1.txt and numbers2.txt both have an unknown number of lines, each line consisting of a single positive in
Reika [66]

Answer:

see explaination for program code

Explanation:

scalar_product = 0

li=[]

li2=[]

#reading numbers1.txt and numbers2.txt intoli and li2 respectively

with open('numbers1.txt') as n1, open('numbers2.txt') as n2:

for line1 in n1:

li.append(int(line1))

for line2 in n2:

li2.append(int(line2))

#storing min list size into variable l

a=len(li)

b=len(li2)

if a<b:

l=a

else:

l=b

#calculating scalar product

for i in range(l):

scalar_product=scalar_product+li[i]*li2[i]

print("scalar product is",scalar_product)

6 0
4 years ago
To have a set of command
GalinKa [24]

Every program that interacts with people responds to a specific set of commands. The set of commands and the syntax for entering them is called the user interface and varies from one program to another. The DOS operating system makes a distinction between internal and external commands.

3 0
3 years ago
How can I make a website login system with only using php?​
Alona [7]

Answer:

<h3><u><em>PHP-enabled web pages are treated just like regular HTML pages and you can create and edit them the same way you normally create regular HTML pages.</em></u></h3>

<u>(I hope this helps!)</u>

4 0
4 years ago
after installing a secondary hard drive what needs to be done to the hard drive and what do these two task do?
elena55 [62]
HEY heheh ehehhegeeh
3 0
4 years ago
What measures are needed to trace the source of various types of packets used in a DoS attack? Are some types of packets easier
cestrela7 [59]

<u>Explanation:</u>

Note, a DoS (Denial of Service) attack is <u>different in scope from a DDoS (Distributed Denial of Service) </u>attack. In a DoS attack, the attack on the website's network comes from just a single source (IP address) repeatedly, while in a DDos attack several Ip addresses or sources attack the network of a website.

To trace the source of various types of packets used in a DoS attack (which of less complexity than a DDos attack), a software application like Wireshark could be used to measure trace the packets used in the attack.

4 0
3 years ago
Other questions:
  • (tco 9) the most common protocol(s) used for sending and retrieving e-mail is(are) _____.
    11·1 answer
  • What is a expansion card for computer?
    5·1 answer
  • I think these might be the answers but im not to sure, so am I right? or wrong? please help
    11·2 answers
  • 1.<br> The correct way to use a seat belt is
    8·1 answer
  • Sandra is having difficulty with her reading assignment because she does not fully understand the language. Which online tool wo
    6·1 answer
  • UDAL Pretest: Using Digital Cameras 15 Select the correct answer. Which mode of shutter speed helps to capture creative effects
    6·1 answer
  • Saitama And Tatsumaki Both Go Shopping Together ,Both have Have 50 loafs of bread , And Saitama takes 43 , How much do Tatsumaki
    14·1 answer
  • Coding with Loops Worksheet
    12·2 answers
  • HELP PLSS!?? I’ve been stuck on this one for a while because I mess up too many time ! If you can solve this than I’ll give you
    11·1 answer
  • Explain two protocols to enhance cellular networks capacity?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!