1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Degger [83]
3 years ago
7

Where can students quickly locate a list of current classes?

Computers and Technology
1 answer:
Olenka [21]3 years ago
4 0
In the front office or if your school has student vue it would be on the first page if online school just scroll down to classes
You might be interested in
Which stroke of the four-stroke cycle is shown in the above figure?
Bogdan [553]

The Exhaust stroke.

The exhaust stroke is the final stroke of the four-stroke cycle engine. It occurs when the stroke valve is open and the intake valve is closed as can be seen in the picture above. The piston in this stage moves upwards from BDC to TDC. The exhaust valve opens other moving parts like the wheel which pushes the piston back to TDC. This action emits the spent air-fuel mixture through the exhaust valve.

7 0
3 years ago
Read 2 more answers
At what point in a vulnerability assessment would an attack tree be utilized?
ella [17]
During threat evaluation - A vulnerability assessment is done to gauge the impact expected from a successful attack and also how vulnerable the software is to an attack. An attack tree, when created during the threat evaluation phase allows one to analyze and describe possible attacks that can be realized on the system.
6 0
3 years ago
1 #Write a function called phonebook that takes two lists as
Nesterboy [21]

Answer:

I am writing a Python program.

def phonebook(names, numbers):  #method phonebook that takes two parameters i.e a list of names and a list of phone numbers

   dict={}  #creates a dictionary

   for x in range(len(names)):  # loop through the names

       dict[names[x]]=numbers[x]  #maps each name to its phone number

   return dict #return dictionary in key:value form i.e. name:number

#in order to check the working of this function, provide the names and numbers list and call the function as following:

names = ['Jackie', 'Joshua', 'Marguerite']

numbers = ['404-555-1234', '678-555-5678', '770-555-9012']

print(phonebook(names, numbers))

Explanation:

The program has a function phonebook() that takes two parameters, name which is a list of names and numbers that is a list of phone numbers.

It then creates a dictionary. An empty dictionary is created using curly brackets. A dictionary A dictionary is used here to maps a names (keys) phone numbers (values) in order to create an unordered list of names and corresponding numbers.

for x in range(len(names)):  

The above statement has a for loop and two methods i.e. range() and len()

len method is used to return the length of the names and range method returns sequence of numbers just to iterate as an index and this loops keeps iterating until x exceeds the length of names.

dict[names[x]]=numbers[x]

The above statement maps each name to its phone number by mapping the first name with the first  umber, the second name with the second number and so on. This mapping is done using x which acts like an index here to map first name to first number and so on. For example dict[names[1]]=numbers[1]  will map the name (element) at 1st index of the list to the number (element) at 1st index.

return dict retursn the dictionary and the format of dictionary is key:value where key is the name and value is the corresponding number.

The screenshot of the program and its output is attached.

7 0
3 years ago
You can perform an in-place upgrade to Windows 7 from both Windows XP and Windows Vista
lbvjy [14]

Answer:

okay, thanks for the info.

Explanation:

have a good day !

~evita

6 0
3 years ago
Output *
lubasha [3.4K]

Answer:

.

Explanation:

.

5 0
2 years ago
Other questions:
  • What is the difference between a denial-of-service attack and a distributed denial-of-service attacks? which is potentially more
    10·1 answer
  • Write a Python script to input time in minutes , convert and print into hours and minutes.
    7·1 answer
  • Templates allow for the quick creation of _____.
    7·1 answer
  • An information- and communication-based electronic exchange environment mostly occupied by sophisticated computer and telecommun
    13·1 answer
  • The CMOS battery located on a computer's motherboard allows for maintaining the correct time and date information stored in CMOS
    7·1 answer
  • Best way to build a model bridge
    5·2 answers
  • In what order does the Cascade look at factors to determine which CSS rule to follow?
    14·1 answer
  • A RISC processor has 186 total registers, with 18 global registers. There are 12 register windows, each with 10 locals. How many
    5·1 answer
  • An algorithm to display multiplication table a number up to 12​
    5·1 answer
  • Two ways of selecting text with mouse​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!