1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mkey [24]
4 years ago
9

Which of the following is false? A. The last element of an array has position number one less than the array size. B. The positi

on number contained within square brackets is called a subscript. C. A subscript cannot be an expression. D. All of these.
Computers and Technology
1 answer:
Veseljchak [2.6K]4 years ago
3 0

Answer:

C.A subscript cannot be an expression

Explanation:

The option C (A subscript cannot be an expression) is false

You might be interested in
I'm skeptical about (b) , is this accurate or the ranges should be listed differently ?​
Inessa05 [86]

Answer:

My guess would be C2-C11, But I may be wrong

Imagine a graph

Hope this helps....

4 0
3 years ago
4.22 lab*: program: automobile service invoice(1) output a menu of automotive services and the corresponding cost of each servic
azamat

To write the code for this exercise, we must be familiar with Python's computational language.

The attachment contains the code.

As a result, the Python code can be written as follows:

0 service1 cost

0 service2 cost

print("Services at Davey's Auto Shop")

print("Oil change: $35; Tire rotation: $19; Car wash: $7; Car wax: $12;"

input = service1 ("Select first service: ")

product2 = input ("Select second service: ")

If "Oil change" is service 1, then

35 service1 cost

Tire rotation: elif service1 == true

cost1 service1 = 19

"Car wash," if service1 is true:

cost service1 = 7

"Car wax" if service1 is true:

cost service1 = 12

if (service1) == "-":

service 1 equals "No service"

0 service1 cost

When service2 equals "Oil change,"

35 service2 cost

Tire rotation: elif service2 == true

cost2 service2 = 19

"Car wash" if service2 is true:

cost2 service2 = 7

"Car wax" if service2 is true:

cost2 service2 = 12

To know more about python click on the link:

brainly.com/question/18502436

#SPJ4

8 0
1 year ago
What is the purpose of the SMTP command "HELO"
sergij07 [2.7K]
If a client initiates the SMTP communication using an EHLO (Extended Hello) command instead of the HELO command some additional SMTP commands are often available. They are often referred to as Extended SMTP (ESMTP) commands or SMTP service extensions. Every server can have its own set of extended SMTP commands.
4 0
3 years ago
What changes have occurred over the last 25 years impacting how we use information systems and that increasingly require using e
Elden [556K]

Answer:

Follows are the solution to this question:

Explanation:

Throughout the presence of third-party companies that is attackers, cryptography is indeed a method of protecting information and communication.

Its cryptographic techniques are numerous, which are used for data security and encryption levels were defines, throughout all protocols.

Encryption - was its method for encoding a message and information. So, it can be viewed only by authorized parties.

They can search online for various data encryption. The changes over the last 25 years also actually occurred:

Cryptography is all around. Each time you make a phone call, buy something like that in a store or even on the Internet with a credit or debit card or receive money from an Atm is an authentication that helps secure and secures the payment.

Tausend years ago, codes or encryption were used to protect information. These encryption schemes have evolved from the past 25 years or say we are getting far better than that of the preceding one But cryptography was far more advanced with both the advent of computers than it used to be.

World War II would also see Enigma code, the perfect example of analog encryption.

Its computer design technology had also finally been enough to break its Enigma cipher, as well as Enigma texts, still are regarded as just a necessary component of the probable Affiliated successes.

Mathematical 128-bit cryptography has become a standard for several sensible computers and portable structures, far greater than every prehistoric or ancient plasterboard.

Without it.

AES - Another of our safest cryptography techniques is the Intensive Encryption System. The state-government uses it to protect classified information, that is used by all of our phones.

6 0
3 years ago
I need help with doing a debate for ela. The debate topic is "do you think we are to dependable on our laptops/cellphones. My te
Mama L [17]

Answer:

I think we are so this is hard lol

Explanation:

we are not too dependable

things that show this is library are still open, school sports teams still flourish(if we were too depending on them they wouldnt) they help us plan ways to interact in person if we were too dependent businesses would struggle more and only be online

this is hard if I can think of any others I'll come back I'm sorry if this isn't any help

7 0
3 years ago
Read 2 more answers
Other questions:
  • Write a program that produces a Caesar cipher of a given message string. A Caesar cipher is formed by rotating each letter of a
    14·1 answer
  • TRUE OR FALSE!!!!!
    6·2 answers
  • Renee's creating a plan for her business's information system. What should she do after she determines the goals for her busines
    10·1 answer
  • Pleaseeee help me w this!
    10·1 answer
  • If you wanted to have wireless connectivity in your home or​ apartment, you would need a​ _________________ to move packets of d
    11·1 answer
  • Which criteria can cuboids/frame selectors be coloured by​
    15·1 answer
  • What is the output of adding 1001011 and 100000?
    7·1 answer
  • Decimal numbers are based on __________.
    6·1 answer
  • What are the cloud storage components
    6·1 answer
  • What two Python data structures are already thread-safe, because they provide automatic support for synchronizing multiple reade
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!