1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cestrela7 [59]
3 years ago
5

What is the term for a piece of data that is to be operated upon or manipulated in some manner?

Computers and Technology
1 answer:
notka56 [123]3 years ago
8 0
Data Manipulation 
Is there any choices?

You might be interested in
A short cut to save a file is
Vanyuwa [196]

Answer:

CTRL+S in most programs

8 0
3 years ago
What commands does SuperKarel know that regular Karel does not?
luda_lava [24]

Answer:

turnRight and turnaround

Explanation:

The regular karel does not know these commands

5 0
2 years ago
All of the following are common causes of electrical accidents and injuries, EXCEPT:
mote1985 [20]
<h3>✽ - - - - - - - - - - - - - - - ~<u>Hello There</u>!~ - - - - - - - - - - - - - - - ✽</h3>

➷ It would be D. I don't really see how the plug itself is a cause of electrical accidents.

<h3><u>✽</u></h3>

➶ Hope This Helps You!

➶ Good Luck (:

➶ Have A Great Day ^-^

↬ ʜᴀɴɴᴀʜ ♡

7 0
3 years ago
Which of the following generally does not apply to all seven domains of an IT infrastructure? Incident response Service level ag
almond37 [142]

Answer:

Option C, Disaster recovery plan

Explanation:

The seven domains of IT are

User Domain

System/Application Domain

LAN Domain

Remote Access Domain

WAN Domain

LAN-to-WAN Domain

Workstation Domain

To these seven domain, the Disaster recovery plan only applies to the LAN-to-WAN Domain as it is vulnerable to corruption of data and information and data. Also, it has  insecure Transmission Control Protocol/Internet Protocol. (TCP/IP) applications and it at the radar of Hackers and attackers

4 0
3 years ago
g Given a character and a list of strings, find strings that do not contain the given character. See the example below. $ (Find
Alex_Xolod [135]

Answer:

The solution code is written in Python 3

  1. def findStr(stringList, c):
  2.    output = []
  3.    for currentStr in stringList:
  4.        if c not in currentStr.lower():
  5.            output.append(currentStr)
  6.    return output  
  7. strList = ["Apple", "Banana", "Grape", "Orange", "Watermelon"]
  8. print(findStr(strList, "g"))

Explanation:

Firstly, we can create a function and name it as findStr which takes two input parameters stringList and a character, c (Line 1).

Create a list that will hold the list of strings that do not contain the input character (Line 2).

Create a for-loop to traverse through each string in the list (Line 3).

In the loop, check if the input character is not found in the current string (Line 4), if so, add the current string to the output list (Line 5). Please note we also need to convert the current string to lowercase as this program should ignore the casing.

After completion the loop, return the output list (Line 7).

We can test the function using a sample string list and input character "g" (Line 9 - 10). We shall get the output as follows:

['Apple', 'Banana', 'Watermelon']

5 0
3 years ago
Other questions:
  • To add text to a slide when using presentation software, you need to add a text box. To add a text box, click the Text Box butto
    6·2 answers
  • Janis is preparing a financial document. She needs to use the dollar symbol placed above the number key 4. Which key will Janis
    12·2 answers
  • Write a program with a function that accepts a string as an argument and returns a copy of the string with the first character o
    11·1 answer
  • A user has been complaining that their wireless connection has been connecting and disconnecting too frequently. what command co
    15·1 answer
  • During prereading, it is not important to pay attention to visual aids.<br> T f
    15·2 answers
  • What data discovery process, whereby objects are categorized into predetermined groups, is used in text mining?
    9·1 answer
  • Where can you find your EFC
    8·2 answers
  • For this assignment your are to implement the Pet Class described in Programming Exercise 1, starting on page 494 in our textboo
    6·1 answer
  • What is hub.pls ans from pic. for computers​
    9·2 answers
  • You want to add a caption to a table. which tab contains this option?.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!