1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
g100num [7]
3 years ago
15

The options are

Computers and Technology
1 answer:
san4es73 [151]3 years ago
5 0
Medicare Tax, Cause your providing options with no question attached. So i'm just giving my input of which im most concerned about.
You might be interested in
Def find_max(nums: [int]) -> int:
SIZIF [17.4K]

Answer:

The program in recursion is:

def find_max(nums):

    if len(nums) == 0:

         return "None"

    elif len(nums) == 1:

         return nums[0]

    else:

         return max(nums[0],find_max(nums[1:]))

Explanation:

This line defines the function

def find_max(nums):

This checks if the list is empty.

    if len(nums) == 0:

If yes, it returns "None"

         return "None"

If the list has just one element

    elif len(nums) == 1:

It returns the only element as the maximum

         return nums[0]

If the list has numerous elemente

    else:

The maximum is determined recursively

         return max(nums[0],find_max(nums[1:]))

To the (b) part:

<em>This program does not necessarily need to be done recursively because the max built-in function can be used to determine the maximum of the list in just one line of code and it is more efficient.</em>

8 0
3 years ago
To narrow the search for consumers, search engines used to measure the relevance of a website or an information page by counting
noname [10]
The answer is : it was easily manipulated.   To narrow the search for consumers, search engines used to measure the relevance of a website or an information page by counting the number of times the searched words appeared on that web page or document.  They don't use this criterion anymore because it was easily manipulated.
5 0
3 years ago
In a bluesnooping attack, the attacker copies emails, calendars, contact lists, cell phone pictures, or videos by connecting to
Kay [80]
The answer is depends. You can only get what the port lets you get. If the phone bans sending photos over Bluetooth than you can’t get the photos
3 0
3 years ago
Thomas is getting ready for a presentation. His slides are set, and he's
Harrizon [31]
I think the answer is B because all of the other ones dont make sense and wouldnt work in a time crunch
5 0
4 years ago
Read 2 more answers
What does the merge &amp; center button in the alignment group on the home tab do?
e-lub [12.9K]
A merge and center does this;
if you have created a table,it just centers a sentance
6 0
3 years ago
Other questions:
  • The conceptual phase of any system or just the software facet of a system best describes the sdlc
    9·1 answer
  • Whats your favorite sport between these options?
    12·2 answers
  • The destructor automatically executes when the class object goes out of ____.
    12·1 answer
  • ? I don’t understand
    8·2 answers
  • The purpose of a ________ is to extract data from operational systems and other sources, clean the data, and store and catalog t
    7·1 answer
  • The NFiPA 704 system uses a numerical value between _____ and _____ to indicate the level of hazard for that particular chemical
    6·2 answers
  • How do you begin typing a table cell
    8·1 answer
  • You can use your student ID card to get discounts in all of the following except
    6·2 answers
  • A _______ read inputs the first data item from a file. It typically appears immediately before the loop that processes the data
    5·1 answer
  • Which of the following tasks will save a file over top of itself, using the same filename? A. Reload B. Save C. Save As D. Expor
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!