1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lina2011 [118]
4 years ago
10

In a function name, what should you use between words instead of whitespaces?

Computers and Technology
1 answer:
Tom [10]4 years ago
3 0
2. Identify the function of computer hardware components 
You might be interested in
You have decided to install the DNS server role on Nano Server. What specific type of zone configuration is not supported when u
nadya68 [22]

Answer:Active Directory-integrated

Explanation: Active Directory-integrated is the service that is introduced by the Microsoft .This service provides the directory form for functioning in Windows. It serves the purpose of active directory(AD) transferring to the Dynamic web database. Whenever the user gets connected to any website, it provides validation to qualifications . So, it does not get support the specification when there is working of DNS.

4 0
3 years ago
The _____ provides a basis for creating the project schedule and performing earned value management for measuring and forecastin
inna [77]

Answer:

WBS

Explanation:

<h2><u>Fill in the blanks</u></h2>

The <u>WBS</u> provides a basis for creating the project schedule and performing earned value management for measuring and forecasting project performance.

6 0
3 years ago
What is the main function of the arithmetic logic unit (ALU)?
elena-14-01-66 [18.8K]
The answer is performing arithmetic and logical operations
7 0
3 years ago
What will happen when users attempt to connect via Telnet or SSH for enable mode when neither the enable secret password command
vovikov84 [41]

<u>Attempt to connect via Telnet or SSH for enable mode:</u>

  • Normally telnet and SSH ism to used login to network socket. Basically to login user is prompted with password and verified.
  • Secret password is one more level to login to access the network.
  • It is used to login copy files to web server so that website pages are update. End user can copy or move the files from web server or cloud computer or UNIX servers.
  • Enable secret password if it is configured, end user login with encrypted technology and plain text format is displayed.
  • Different between enable secret and enable password is enable secret is encrypted and enable password is not encryption and plain text.
6 0
3 years ago
Write a Python script to input time in minutes , convert and print into hours and minutes.
cluponka [151]

Answer:

Following are the Python program to this question:  t=float(input("Enter time value in seconds: "))#input time in seconds by user

d = t // (24 * 3600) #calculate day and store in d variable  t= t % (24 * 3600)#calculate time and store in t variable  h = t // 3600#calculate hour and store in h variable  t %= 3600#calculate time and store in t variable  m=t // 60#calculate minutes and store in m variable  t%= 60#calculate time and store in t variable  s = t#calculate second and store in s variable  print("day:hour:minute:second= %d:%d:%d:%d" % (d,h,m,s))#print calculated value

Output:

Enter time value in seconds: 1239876

day:hour:minute:second= 14:8:24:36

Explanation:

Description of the above can be defined as follows:

  • In the above Python program code an input variable "t" is declared, which uses the input method to input value from the user end.
  • In the next step, "d, m, and s" is declared that calculates and stores values in its variable and at the last print, the method is used to print its value.
7 0
3 years ago
Other questions:
  • A password checking system that disallows user passwords that are proper names or words that are normally included in a dictiona
    15·1 answer
  • Cobbling together elements from the previous definition and whittling away the unnecessary bits leaves us with the following def
    7·1 answer
  • Which is an internet service?<br><br> Antivirus<br> Chat<br> Firewall<br> Router
    8·2 answers
  • Write java code that displays all the objects in a stack in the order in which they were pushed onto it. after all the objects a
    5·1 answer
  • 1) List at least five smaller behaviors you could break the complex behavior "brushing my teeth" into.
    14·2 answers
  • 11. Its collection of toys which could be used in the game via an implanted RFID chip made Activision’s game _______ one of the
    7·2 answers
  • Which of these options highlights the need for learning algorithms
    9·2 answers
  • Think about the ways new communication technologies can make certain tasks easier for
    13·1 answer
  • Write a program, called compute_stats.c, which opens a data file, called numbers.txt, which contains of a list of positive integ
    10·1 answer
  • What is the definition of Graphic AIDS?.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!