1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vesnalui [34]
3 years ago
11

Whoever likes anime add my discord notadaikon#3128

Computers and Technology
1 answer:
lana66690 [7]3 years ago
5 0

Answer:

Ok!  :>

Explanation:

You might be interested in
Technologies that function within the established system are called
vesna_86 [32]
<span>Authorizing technologies are technologies that controls the use of system and network resources through authentication and authorization. 
</span><span>Enabling technologies are innovation technologies that drive radical change in the capabilities of a user or culture.
</span>Obstructing technologies include blocking<span> and filtering, content manipulation, attacks.
</span>Preemption means "prior seizure of" and preemptive technologies <span>take control of the operating system from one task and giving </span>it<span> to another task.
</span><span>Technologies that function within the established system are called enabling technologies.</span>
8 0
3 years ago
Assume that word is a variable of type String that has been assigned a value. Write an expression whose value is a String consis
DerKrebs [107]

Answer:

Follwing is the python code:-

word=str(input("Enter the string\n"))

new=word[0:3] #expression for first three characters of the string.

print(new)

Output:-

Enter the string

chandelier

cha

Explanation:

The expression word[0:3] is for extracting first three characters form the string.

word[0:3] = It extracts characters from index 0 to index 2 it does not include 3.3 is excluded.

7 0
3 years ago
Please read !!!
prisoha [69]
Don’t stress. You’re no failure if you believe in yourself. Have some faith. Don’t give up and live your life to the fullest. Take care and stay safe!! :)
3 0
3 years ago
2. You turn on your Windows 7 computer and see the system display POST messages. Then
Anton [14]
The monitor would definitely be the problem in this scenario.
7 0
3 years ago
What can help prevent issues related to downloading content from the internet?
vodka [1.7K]

Answer:

D)

Explanation:

3 0
3 years ago
Other questions:
  • The process that uses 3D modeling software to create a representation of a three dimensional object is called 3D modeling.
    15·2 answers
  • Which of the following statements is true regarding ARPANET? Select 3 options. It was a product of Bell Laboratories and was int
    9·1 answer
  • What is one problem you should keep in mind when researching information on the Internet?
    6·2 answers
  • From an IT perspective, which of the following best describes BI and BI apps?
    13·1 answer
  • 8) The higher the drag coefficient, the_____ the car will go<br> a)Siower<br> b)Faster
    9·2 answers
  • How many dog breed are there
    9·2 answers
  • Write a program that accepts two numbers R and H, from Command Argument List (feed to the main method). R is the radius of the w
    11·1 answer
  • In a black box model are the customers told that they should be expecting to be haxked?
    13·1 answer
  • 2 4.1.2 Quiz: Information Systems and Business Planning
    11·1 answer
  • WHAT IS A GOOD APP FOR REMOVING VIRUSES AND IT YOU DONT HAVE TO PAY MUCH FOR IT ????? PLEASE HELP ME
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!