1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liubo4ka [24]
3 years ago
12

Anyone here good with python coding. I have some machine learning homework which I am having a hard time with,

Computers and Technology
1 answer:
scoundrel [369]3 years ago
8 0
Is there a picture? Like that I can see
You might be interested in
Yall tryna play gta later? I play on ps4
iVinArrow [24]

Answer:

xbox tho

Explanation:

8 0
3 years ago
Read 2 more answers
I need help thanks please!
maw [93]

Answer:

a) to persuade

she is doing this to propose an idea to the boss of the company

6 0
3 years ago
Read 2 more answers
What phrase indicates someone has knowledge and understanding of computer,internet,mobile devices and related technologies?
navik [9.2K]

Digital literacy is the term for having knowledge of computers, internet, mobile devices and related technologies.

7 0
3 years ago
9. In Electronic Codebook (ECB): a. The message is broken into independent blocks which are encrypted b. The message is broken i
DaniilM [7]

Answer:

The correct answer is letter "A": The message is broken into independent blocks which are encrypted.

Explanation:

There are five (5) main forms of encryption: <em>Electronic Code Book (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Output Feedback (OFB)</em>. Electronic Code Book (ECB) is the simplest of all of them. Using this method to encrypt information implies dividing a message into two parts to encrypt each block independently. ECB does not hide patterns effectively because the blocks are encrypted using identical plaintexts.

8 0
4 years ago
Describe the information technology industry today
Volgvan

Answer:

The information technology (IT) sector includes companies that produce software, hardware, or semiconductor equipment, and companies that provide internet or related services.

Explanation:

6 0
2 years ago
Other questions:
  • What is the maximum number of communication paths for a team of twenty people?
    5·1 answer
  • What default length is used for the ospf dead interval?
    14·1 answer
  • How does the access point know whether a wireless data packet is intended for its network?
    14·1 answer
  • Write an expression that will print "in high school" if the value of user_grade is between 9 and 12 (inclusive). Sample output w
    12·1 answer
  • A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for
    10·1 answer
  • Please Help!
    14·2 answers
  • Provide the instruction type, assembly language instruction, and binary representation of instruction described by the following
    7·1 answer
  • 2.2-2 Consider sorting numbers stored in array by first finding the smallest element n A of and exchanging it with the element i
    11·1 answer
  • Which word goes with "meals
    5·2 answers
  • What is the difference between digital art and digital design?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!