1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Scrat [10]
3 years ago
12

Harry is undertaking a digital photography course as the college and wants to

Computers and Technology
1 answer:
Ludmilka [50]3 years ago
4 0

C. Unconventionally yes it will break down the system potentially causing a virus

You might be interested in
A security administrator wants to empty the DNS cache after a suspected attack that may have corrupted the DNS server. The serve
sattari [20]

Answer:

IPCONFIG Pls mark brainliest

Explanation:

3 0
3 years ago
Which example describes sharing risk?
irina1246 [14]

Answer:

where are the examples at I dont see them

3 0
3 years ago
__________ is a contemporary term for data and software tools for organizing, analyzing, and providing access to data to help ma
klemol [59]

Answer:

Business Intelligence .

Explanation:

Business intelligence is a type of technology that is used by enterprises for the analysis of the data about the information of the business intelligence converted the usefulness data into its corresponding  information which is meaningful.

The main function of the business intelligence for organizing the data, analyzing the data, and providing access data to the manager as well as for the other enterprise for the decision making activity.

6 0
3 years ago
What does this mean in python?
scoundrel [369]

the comments in the code should explain everything, brainly's formatting might be weird


gate = raw_input("Enter logic gate :").upper()#.upper() so lower/upper case of input doesn't matter

firstInput = raw_input("Enter first input :")#raw_input() for python 2.7, input() for 3

secondInput = raw_input("Enter second input :")

if (firstInput!="0" and firstInput!="1") or (secondInput!="0" and secondInput!="1"):

print("inputs must be 0 or 1")#ensure all inputs are in boolean range

quit()


firstInput=firstInput=="1"#convert "1" to true and "0" to false

secondInput=secondInput=="1"


if gate=="AND" or gate=="NAND":

result=firstInput and  secondInput

elif gate=="OR" or gate=="NOR":

result=firstInput or secondInput

elif gate=="XOR":

result=firstInput!=secondInput

else:#handle case of unknown/mistyped gates

print(gate+" is not known")

quit()

if gate=="NOR" or gate=="NAND":

result=not result#invert result for nor and nand

print("Result = "+str(int(result)))#uses int so 1/0 are printed instead of True/False


8 0
3 years ago
Consider the following code segment:
prisoha [69]

ArrayLists are arrays that can be resized

The list that represents the value of nums after executing the code segments is [20, 30, 90, 50]

<h3>How to determine the value of the list</h3>

From lines 1 to 5 of the program, the content of the nums list is:

nums = [10, 20, 30, 40, 50]

Next, the element at the 3rd index is removed and saved in x.

So, we have:

nums = [10, 20, 30, 50]

x= 40

Next, the element at the 0 index is removed and then added to x.

The result is then saved in y

So, we have:

nums = [20, 30, 50]

y= 50

x = 40

The values of x and y are added and then inserted at the 2nd index of the arraylist.

So, we have:

nums = [20, 30, 90, 50]

Hence, the list that represents the value of nums is [20, 30, 90, 50]

Read more about arraylists at:

brainly.com/question/26264399

8 0
2 years ago
Other questions:
  • What role do you think mobile devices have played in shaping the world?
    13·1 answer
  • Which javascript method should you use if you want to specify a message string to appear on your web page as it loads?
    13·1 answer
  • 1) What is Net beans
    6·1 answer
  • Data as a service began with the notion that data quality could happen in a centralized place, cleansing and enriching data and
    15·1 answer
  • What is the single most important component of a computer? Central Processing Unit DIP Motherboard Chipset
    8·1 answer
  • Under the assumption that there exists an unknown Turing machine encodableinc1bits that decides3-SATis inO(n10) time, give imple
    7·1 answer
  • The Internet was first used by which of the following institutions?
    15·2 answers
  • If you’d like to have multiple italicized words in your document, how would you change the font of each of these words
    13·1 answer
  • Digital Media Equipment: Best Practices Quiz
    15·1 answer
  • Which discipline focuses on the design of computer hardware?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!