1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jenyasd209 [6]
4 years ago
9

Is a hotdog a sandwich?​

Computers and Technology
2 answers:
Stells [14]4 years ago
4 0

Answer:

Explanation:

Yes

ki77a [65]4 years ago
3 0

Answer:

no

Explanation:

You might be interested in
2.24 Write the relevant Python expression or statement, involving a list of numbers lst and using list operators and methods for
miskamm [114]

Answer:

lst = [11, 603, 99, 7, 582, 1];

print("The index of the middle element: " + str(int(len(lst)/2)))

print("The middle element: " + str(lst[int(len(lst)/2)]))

lst.sort()

sorted_lst = lst.reverse()

print("The list in descending order: " + str(lst))

first_number = lst.pop(0)

lst.append(first_number)

print("New lst: "+ str(lst))

Explanation:

- Initialize a list

- Find the middle index, int(len(lst)/2)

- Find the middle element, lst[int(len(lst)/2)]

- Sort the list in descending order (First sort the list in ascending order than reverse it)

- Get the first element using <em>pop</em> method, and append it to the end using <em>append</em> method

- - - - -

a) 0 == 1 == 2 --> Always evaluates false

b) 2 + (3 == 4) + 5 == 7 --> Evaluates true

c) 1 < -1 == 3 > 4 --> Always evaluates false

3 0
4 years ago
A telephone-repair technician uses a meter to measure voltage on a phone line. This meter is an example of _____. hardware softw
andrew-mc [135]
A meter to measure voltage would be an example of hardware.
5 0
3 years ago
Read 2 more answers
Apart from using secure networks, how else can Dhruv keep his deliverables safe in the office and on the go? Select all that app
solong [7]

It should be noted that data can be secured when working in the following way:

  • Establishing a cyber security policy.
  • Using two-factor authentication.
  • Keeping passwords strong.
  • Using secure internet connections.

Your information is incomplete. Therefore, an overview relating to the topic will be given. It should be noted that as telecommuting becomes a standard practice, the challenge regarding data security increases.

Employers should educate their employees about data security. The workers should know that data security is a priority and that all the internet connections are secure.

Learn more about data security on:

brainly.com/question/10091405

6 0
3 years ago
Which is NOT a reason to study science?
VMariaS [17]
Hi!

Science is a way of thinking about the natural world. It asks thought provoking questions and investigates deep into the human mind, our Earth, our periodic table, or our cosmos.

It's a vast field, with a myriad of career options. Scientists want to learn more about how our natural world works, and experiment to discover newfound facts about life as we know it.

Not to <em>blow... </em>away... your... expectations... but, in science, we rarely blow up things. If you're interested in seeing explosions, go apply to be a myth buster.

Hopefully, this helps! =)
8 0
4 years ago
Compare and contrast the various options that exist for acquiring software.
Softa [21]

Answer:

   The various options that exist for acquiring software are:

  •  By developing a various custom applications so that, they can satisfied the requirements in an organization.
  •  By purchasing various software application or packages for modify the software to meet the specific requirements.
  •  Used the open source software for developing the specific information system so that, the system are acquired.
  •  Developed the in-house capabilities and skills of employee, this is the main advantage for acquiring the software.  
6 0
3 years ago
Other questions:
  • What would make this comparison statement False? Complete with the appropriate relational operator. "G" _____= "G"
    10·1 answer
  • Which software application can best help teachers determine their students' average grades?
    5·2 answers
  • The Warn-on-Forecast has been developed by the National Weather Service to help predict hazardous weather earlier. Which of the
    10·2 answers
  • Which of the following could be omitted from a company's AUP? A.Permissible lunchtime online activities B.Employees' home email
    15·2 answers
  • Consider having three String variables a, b, and c. The statement c = a + b; also can be achieved by saying_____________.a. c =
    11·1 answer
  • Create a do-while loop that asks the user to enter two numbers. The numbers should be added and the sum displayed. The loop shou
    5·1 answer
  • Player casts 'Assassinate' on 'Acolyte of pain'. Acolyte's owner will:
    6·2 answers
  • The term "exception propagation" means:
    5·1 answer
  • Which views can be used to see appointments in Outlook 2016? Check all that apply. Today Tomorrow Next 7 Days Work Week Two Week
    13·1 answer
  • What method does a gsm network use to separate data on a channel?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!