1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Black_prince [1.1K]
4 years ago
5

A Python keyword ______________. Can only be used in the comments section can be used anywhere in a Python program cannot be use

d outside of its intended purpose can be user defined
Computers and Technology
2 answers:
malfutka [58]4 years ago
8 0

Answer:

"Can be user defined" is NOT correct

Explanation: Got it wrong on Edgenuity :(

steposvetlana [31]4 years ago
5 0

Answer:

C

Explanation:

Keywords have specific uses.

edgenuity am i right?!

You might be interested in
5: what privacy issues have arisen with webcams in mobile devices?
AnnZ [28]

What are the privacy issues that have arisen with webcams and mobile devices? People secretly record and broadcast other people without their permission.

3 0
3 years ago
If a user has one column in a table and would like to make it into two columns, which command should be used?
Vesna [10]
Split cells.

This answer needs to be twenty characters long to qualify so here is this useless sentence.
4 0
4 years ago
_____________ is the characteristic of a resource that ensures that access is restricted to only permitted users, applications,
Maksim231197 [3]

Answer:

The answer to this question is "Confidentiality".

Explanation:

The answer is Confidentiality because in any computer system many files are important for there user. If the file was deleted, corrupted or stolen from the computer. So the user faces the difficulty to avoid this type of problem computer system provides a technique that is access control or it is also known as Confidentiality. It is a technique that controls who or what type of user's use of resources in a computing environment.

So the answer to this question is Confidentiality.

4 0
3 years ago
(03.02 LC)
Elza [17]
VR requires complete immersion, VR devices shut out the physical world completely. The lens on the smart glasses that deliver AR capabilities, on the other hand, are transparent. Understanding these differences is critical in determining the best use cases for each.
5 0
2 years ago
True or False: Cracking a Vigenère cipher with brute force takes longer than a Caesar cipher, but it is still a reliable method
iragen [17]

Answer:

False

Explanation:

The Vigenere cipher is an encryption method that uses a series of interwoven Ceaser ciphers and a keyword to encrypt text. The difference between this cipher and the Ceaser cipher is the tabular interwoven Ceaser cipher and the keyword.

Multiple keywords can be used in the Vigenere cipher. The use of this keyword makes the brute-force decipher algorithm unreliable for decoding text encrypted with it.

7 0
3 years ago
Other questions:
  • Jack wants to store a large amount of data on his computer. He chooses to use a database for this purpose. What is a database? A
    8·1 answer
  • Most network cards contain a port that accepts a(n) ____, which looks similar to a telephone connector but is larger.
    14·1 answer
  • Digital information is stored using a series of ones and zeros. Computers are digital machines because they can only read inform
    15·1 answer
  • What is the name of the keyboard developed in the 1930s?
    13·1 answer
  • The narrative structure of the popular movies can be broken down into
    15·1 answer
  • Given a UNIX file system with 1024-byte blocks, how many disk accesses are needed to access bytes 2500-2503 of a file (assume th
    12·1 answer
  • Which one of the following is the correct code snippet for calculating the largest value in an integer array list aList?
    5·2 answers
  • Ted is looking for a reliable source for his paper. Which of the following sites would be considered reliable?
    5·1 answer
  • A domain name is used to: *
    15·1 answer
  • Backup software creates backups and prevents you from losing all your data, so would backup software be considered an applicatio
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!