1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dexar [7]
4 years ago
8

What does ;-; mean during a text?

Computers and Technology
2 answers:
Kaylis [27]4 years ago
7 0

Answer:

A face or like a keyboard emoji people uses for fun, the face can actually mean a lot of stuff.

zzz [600]4 years ago
5 0

Answer:

Its like an emotionless crying face, mainly used for humor

Explanation:

You might be interested in
Keion works as a freelancer creating websites and designing logos for clients. He recently had a hard drive failure and lost wor
fomenos

Answer:

Raid 0B

Explanation:

4 0
4 years ago
The CIBER network provides a link between the human resource and technology needs of a company with the research capacities and
Elan Coil [88]

The CIBER network provides a link between the human resource and technology needs of a company with the research capacities and language training found at universities.

What is CIBER network?

The Omnibus Trade and Competitiveness Act of 1988 established the Centers for International Business Education and Research (CIBERs) to increase and promote the nation's capacity for international understanding and competitiveness.

The United States administers it. The CIBER network, established by the Department of Education under Title VI, Part B of the Higher Education Act of 1965, connects the manpower and technological needs of the US business community with the international education, language training, and research capacities of universities across the country.

The thirty-one Centers provide regional and national resources to businesspeople, students, and educators at all levels.

To know more about network, visit: brainly.com/question/1326000

#SPJ4

3 0
1 year ago
Sean is white hat hacker, who is demonstrating a network level session hijack attacks and as part of it, he has injected malicio
solong [7]

Answer:

The following network level session hijacking attack shown by Sean is Blind Hijacking, LETTER C.

Explanation:

<em>Because he is injecting malicious data or commands into the intercepted communications in the TCP session even if the source-routing is disabled. He can send the data or commands but hass no access to see the response.</em>

3 0
4 years ago
Write a program whose input is a string which contains a character and a phrase, and whose output indicates the number of times
otez555 [7]

Answer:

The program written in python is as follows

def countchr(phrase, char):

     count = 0

     for i in range(len(phrase)):

           if phrase[i] == char:

                 count = count + 1

     return count

phrase = input("Enter a Phrase: ")

char = input("Enter a character: ")

print("Occurence: ",countchr(phrase,char))

Explanation:

To answer this question, I made use of function

This line defines function countchr

def countchr(phrase, char):

This line initializes count to 0

     count = 0

This line iterates through each character of input phrase

     for i in range(len(phrase)):

This line checks if current character equals input character

           if phrase[i] == char:

The count variable is incremented, if the above condition is true

                 count = count + 1

The total number of occurrence is returned using this line

     return count

The main method starts here; This line prompts user for phrase

phrase = input("Enter a Phrase: ")

This line prompts user for a character

char = input("Enter a character: ")

This line prints the number of occurrence of the input charcater in the input phrase

print("Occurence: ",countchr(phrase,char))

4 0
3 years ago
What exactly is 'epsilon' in Python?
lisov135 [29]
Is defined as the smallest number that when added to one yields a result different from one
3 0
4 years ago
Other questions:
  • A car moves down the street at 45 kph. The driver takes his foot off the gas pedal but does not brake. Which is the correct expl
    5·2 answers
  • The tools that cyber criminals often use, including computer viruses, worms, trojan horses and spyware, are called __________. q
    5·1 answer
  • Vlad is the leader of a group; he receives most of the messages from the group members, and he provides most of the information
    6·1 answer
  • Which is the biggest known issue specific to satellite Internet connections?
    13·2 answers
  • TABLE TEST
    12·1 answer
  • Lyla is writing a program that uses a recursive method. Why might she want to use a recursive helper method?
    8·1 answer
  • When you call a method with a parameter list, the arguments in the argument list Select one: a. must be coded in the same sequen
    15·1 answer
  • Need answer ASAP!!!!
    14·1 answer
  • List three variables that could be used in creating a model that determines the best day to plant corn in a given location. 30 p
    10·1 answer
  • The local Driver's License Office has asked you to write
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!