1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
S_A_V [24]
4 years ago
11

Can someone show me a image of this completed I will mark brainliest!!! It's typing.com

Computers and Technology
1 answer:
WARRIOR [948]4 years ago
5 0

Answer: here you are!

Explanation:

You might be interested in
Write a python program stored in file extra_credit.py that takes three different inputs from the user where : First Input: The p
LUCKY_DIMON [66]

Answer:

Check the explanation

Explanation:

print("************************************************************")

sentence = input("Enter a sentence : ").split()

replace_words = input("\nEnter the words that should be replaced : ").split()

special = input("\nEnter the replacing special Character : ")

result = []

for word in sentence:

   if word not in replace_words:

       result.append(word)

   else:

       result.append(special * len(word))

result = ' '.join(result)

print("\nThe Sentence with words censored is : " + result)

print("************************************************************")

4 0
3 years ago
Where are the values the computer is directly working with at a particular moment in time stored?
pav-90 [236]

On the CPU register (?) The CPU registers are registers with small amounts of high-speed memory contained within the CPU. They are used by the processor to store small amounts of data that are needed during processing

Hope this helps and that you have a good day

4 0
3 years ago
A computer professional who has access to sensitive information shares this information with a third party. Which professional c
Airida [17]

The correct answer is c

6 0
3 years ago
Read 2 more answers
Please explain this code line by line and how the values of each variable changes as you go down the code.
Scilla [17]

Answer:

hope this helps. I am also a learner like you. Please cross check my explanation.

Explanation:

#include

#include

using namespace std;

int main()

{

int a[ ] = {0, 0, 0};  //array declared initializing a0=0, a1=0, a3=0

int* p = &a[1]; //pointer p is initialized it will be holding the address of a1 which means when p will be called it will point to whatever is present at the address a1, right now it hold 0.

int* q = &a[0];  //pointer q is initialized it will be holding the address of a0 which means when q will be called it will point to whatever is present at the address a0, right now it hold 0.

q=p; // now q is also pointing towards what p is pointing both holds the same address that is &a[1]

*q=1 ; //&a[0] gets overwritten and now pointer q has integer 1......i am not sure abut this one

p = a; //p is now holding address of complete array a

*p=1; // a gets overwritten and now pointer q has integer 1......i am not sure abut this one  

int*& r = p; //not sure

int** s = &q; s is a double pointer means it has more capacity of storage than single pointer and is now holding address of q

r = *s + 1; //not sure

s= &r; //explained above

**s = 1; //explained above

return 0;

}

6 0
3 years ago
Who is the best Attack on Titan Character?
lions [1.4K]

Answer:

Levi

Explanation:

Levi is just a massive W of a character

4 0
3 years ago
Read 2 more answers
Other questions:
  • How do you do these questions? The first two questions could have multiple answers and the third is one answer only.
    7·1 answer
  • In two or more complete sentences, summarize the difference between renewable and nonrenewable resources? Justify your responses
    13·2 answers
  • Describing Editing Task
    6·1 answer
  • One thing we might want to know, given an input to a chatbot, is if the input is a question.
    10·1 answer
  • A photograph with more yellows has which mood
    6·2 answers
  • TCP is a Transport-layer protocol used to communicate between applications, but it's a lightweight Transport-layer protocol, mea
    10·1 answer
  • The documents created in ms-excel is call what?​
    11·2 answers
  • Recently, a serious security breach occurred in your organization. An attacker was able to log in to the internal network and st
    11·1 answer
  • Who you think is better? Ninja or TFue ,btw do you know who icebear is?
    9·1 answer
  • 9. Changing from a bystander to an advocate requires
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!