1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LenaWriter [7]
2 years ago
10

Can someone please please please help me!

Computers and Technology
1 answer:
vova2212 [387]2 years ago
5 0
Is that apologetics?

You might be interested in
What type of account provides the same functions as managed service accounts but can be managed across multiple servers as in a
damaskus [11]

Answer:

group managed service account

Explanation:

A group managed service account gMSA is  a extension to the standalone Managed Service Account (sMSA). sMSA is a managed domain account that automates password management, simplifies service principal name (SPN) management and delegates  management to other administrators. it was introduced in Windows Server 2008 R2 and Windows 7.  However, the group Managed Service Account (gMSA) provides all the functionalities of an sMSA but also extends this functionality over multiple servers.

6 0
3 years ago
WHAT IS A COMPUTER ????
Allushta [10]
A piece of technology
6 0
3 years ago
Read 2 more answers
(In C prog.) What is the difference between scanf, getche and getchar?
lara [203]
<span>getchar() only reads a single character input from any input stream.
getche() </span><span>reads a single character from the keyboard and displays immediately on output screen without waiting for enter key
scanf() reads the whole input line according to the data type you specified.</span>

7 0
3 years ago
What is the energy conversion of solar water heaters?
Gelneren [198K]
A liquid-to-liquid heat exchanger uses a heat-transfer fluid that circulates through the solar collector, absorbs heat, and then flows through a heat exchanger to transfer its heat to water in a storage tank. Heat-transfer fluids, such as antifreeze, protect the solar collector from freezing in cold weather.
7 0
3 years ago
Modify the program you wrote for Chapter 6 Exercise 6 so it handles the following
Basile [38]

Answer:

#try except

try:

   #opening the file

   read_file = open('numbers.txt', 'r')

   #Store the numbers in the variable file_numbers.

   file_numbers = read_file.read()

   #close the file

   read_file.close()

   #Split the number of files in list_values.

   list_values = file_numbers.split()

   #how many numbers are there

   list_length = len(list_values)

   try:

       #loop it up

       for i in range(list_length):

           list_values[i] = float(list_values[i])

       #Add up all the numbers, put into list_sum

       List_sum = sum(list_values)

       #heres how we average it

       Average_value = (List_sum)/list_length

       #print

       print(Average_value)

   except ValueError:

       print( "File must have only numbers. Try again." )

   #handles IOError exceptions

except IOError:

   #Display statement

   print("Trouble opening file. Try again.")

Explanation:

The python program uses the try-except exception handling method to catch errors in the code. The IOError is used for catching input and output errors in the program like file handling while the ValueError keyword in the except statement is used to catch data type errors from a return statement, calculation or user input.

6 0
3 years ago
Other questions:
  • Mm
    10·1 answer
  • What formatting option is easiest to read when printed out
    12·1 answer
  • Why Unicode is the standard way of converting binary to text?
    8·1 answer
  • Web résumés are posted to the Internet in HTML format.<br> true or false
    9·2 answers
  • Write a program that repeatedly takes integers from the user as long as he
    7·1 answer
  • The sun can be an excellent source of natural light.<br> True.<br> False.
    8·2 answers
  • What statement best describes entrepreneurship?
    7·2 answers
  • What type of an attack is being executed if an attacker substituted an invalid mac address for the network gateway so no users c
    10·1 answer
  • Write the following short piece of code in python:
    13·1 answer
  • What type of attack occurs when the threat actor snoops and intercepts the digital data transmitted by the computer and resends
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!