1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dybincka [34]
4 years ago
11

Inherent flaws in system software code are called:

Computers and Technology
1 answer:
antiseptic1488 [7]4 years ago
7 0
It is called vulnerabilities 
You might be interested in
You have a chart that shows 100 data points and you've circled the highest value. Which of the following are you using?
cricket20 [7]

The Rudolph Rule states that  simple ways you can make information stand out and guide or satisfy your audience to important details and highlight important  information in your presentation

so i conclude option D is correct for above statement

hope it helps

5 0
3 years ago
Read 2 more answers
Where does cable termination occur in most buildings?
Igoryamba

Answer:

Demarcation point

Explanation:

There is point that is set by engineers for the entrance of the cables to provide different services such as Telephone, internet and other utilities. At this point a device has been installed, in which service provider and end users plugin their cables.

Service providers is responsible for any service degradation till this point. After this point user is responsible for any damage. This point is called Demarcation point .

6 0
3 years ago
Python programming questions:
Aleksandr-060686 [28]

Answer:

Following are the program in the Python Programming Language:

1.)

l=['Ruby','Dale','Kate']

n=input('Enter the name: ')

if(n in l):

   print('Hello {}'.format(n))

else:

   print('No {}'.format(n))

Output:

Enter the name: Dale

Hello Dale

2.)

file=open("text1.txt", "r+") #open file

str=file.read()  #read file

txt=str.replace('\n', ' ') #replace spaces

word=txt.split(' ') #split words in ' '

for words in word: #set for loop

   word2=' '

   for i in range(len(words)):  #set for loop

       if(words[i].isalpha()):  #set if statement

           word2 += words[i].lower()

   word[word.index(words)]=word2

while(' ' in word):  #set while loop

   word.remove(' ')  #remove spaces

st=set(word)

print('The ', len(st),' unique words which appears in document are ' \

     '(in no particular order): ')

for words in st:  #set for loop

   print('-', word)

file.close()  #close file

3.)

file=open("text1.txt", "r+") #open file

str=file.read()  #read file

txt=str.replace('\n', ' ') #replace spaces

word=txt.split(' ') #split words in ' '

for words in word: #set for loop

   word2=' '

   for i in range(len(words)):  #set for loop

       if(words[i].isalpha()):  #set if statement

           word2 += words[i].lower()

   word[word.index(words)]=word2

while(' ' in word):  #set while loop

   word.remove(' ')  #remove spaces

dic={}  #set dictionary

for words in word:  #set for loop

   if(words not in dic):  #set if statement

       dic[words]=1

   else:

       dic[words] +=1

print('\033[4m' + 'word   frequency' + '\033[0m')

for words in dic:

   print(format(words, '15s'), format(dic[words], '5d'))

file.close() #close file

Explanation:

1.) Here, we define the list data type variable 'l' then, set the variable 'n' and assign value by get input from the user,

  • we set if conditional statement and pass condition is that the variable 'n' is in the variable l then, print message.
  • otherwise, we print No message.

2.) Here, we define the variable "file" in which we open file and save that file in it.

Then, we set variable st which read the file then we set the variable in which we apply the replace().

Then. we set variable in which we split the by suing split()

2.) Here, we define the variable "file" in which we open file and save that file in it.

Then, we set variable st which read the file then we set the variable in which we apply the replace().

Then. we set variable in which we split the by suing split()

Then, we apply all that given in the question.

7 0
3 years ago
The best grounding method when arc welding is to connect the welding machine grounding cable to
Scorpion4ik [409]
The material you are welding other wise an arc will not be created 
5 0
3 years ago
Read 2 more answers
Create an array w with values 0, 0.1, 0.2, . . . , 3. Write out w[:], w[:-2], w[::5], w[2:-2:6]. Convince yourself in each case
larisa86 [58]

Answer:

w = [i/10.0 for i in range(0,31,1)]

w[:]  = [0.0, 0.1, 0.2, 0.3, 0.4, 0.5, 0.6, 0.7, 0.8, 0.9, 1.0, 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 2.0, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 2.9, 3.0]

w[:-2] = [0.0, 0.1, 0.2, 0.3, 0.4, 0.5, 0.6, 0.7, 0.8, 0.9, 1.0, 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 2.0, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8]

w[::5]= [0.0, 0.5, 1.0, 1.5, 2.0, 2.5, 3.0]

w[2:-2:6] = [0.2, 0.8, 1.4, 2.0, 2.6]

Explanation:

List slicing (as it is called in python programming language ) is the creation of list by defining  start, stop, and step parameters.

w = [i/10.0 for i in range(0,31,1)]

The line of code above create the list w with values 0, 0.1, 0.2, . . . , 3.

w[:]  = [0.0, 0.1, 0.2, 0.3, 0.4, 0.5, 0.6, 0.7, 0.8, 0.9, 1.0, 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 2.0, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 2.9, 3.0]

since start, stop, and step parameters are not defined, the output returns all the list elements.

w[:-2] = [0.0, 0.1, 0.2, 0.3, 0.4, 0.5, 0.6, 0.7, 0.8, 0.9, 1.0, 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 2.0, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8]

w[:-2] since  stop is -2, the output returns all the list elements from the beginning to just before the second to the last element.

w[::5]= [0.0, 0.5, 1.0, 1.5, 2.0, 2.5, 3.0]

w[::5] since  step is -2, the output returns  the list elements at index 0, 5, 10, 15, 20, 25,30

w[2:-2:6] = [0.2, 0.8, 1.4, 2.0, 2.6]

the output returns the list elements from the element at index 2  to just before the second to the last element, using step size of 6.

6 0
3 years ago
Other questions:
  • All of the following are recommended to secure a wireless network EXCEPT:
    5·2 answers
  • After you post a video of yourself defacing school property You can likely expect that
    11·2 answers
  • With ____________________, you can insert and remove a device while the computer is running.
    11·1 answer
  • Exchanging which type of data uses the least bandwidth?
    7·2 answers
  • Each wireless network has its own name to identify it, known as service set identity. true false
    9·1 answer
  • I need help plz it’s python
    6·1 answer
  • Any movie/show suggestions??
    7·2 answers
  • Who is this person?<br><br><br> Kaneppeleqw. I see them everywhere. Are they a bot? Are they human?
    8·1 answer
  • Jenny needs to record the names of 30 students, write down the subjects they studied, and note their grades in each subject afte
    8·1 answer
  • Whats the best way to make a video game?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!