1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sveta_85 [38]
3 years ago
14

20

Computers and Technology
1 answer:
denis-greek [22]3 years ago
6 0

Answer:

true

Explanation:

because my 8 ball said so

You might be interested in
All changes
Vsevolod [243]

You should get up and move every 30 minutes

Hope  this helps

-scav

7 0
3 years ago
: Write a function "def countWords(string)" that returns a count of all words in an input string represented by the variable 'st
Zina [86]
We can define a word as a group of characters without a space between them. To find the words of the input string , w can use split(delimiter) which returns a list of strings which had the defined delimiter between them in the input string.

def countWords(string):
words = string.split(" ")
count = len(words)
return count

Here we set the delimiter as the space character, and returned the length of the words list. I split each step into its own line for readability, however the function could be one line:

return len(string.split())

Here, no delimiter is specified. If one isn't given, it will default to split at any whitespace, including space.

3 0
3 years ago
How does design influence the product's function?
r-ruslan [8.4K]
I think the answer is
8 0
3 years ago
A security specialist discovers a malicious script on a computer. The script is set to execute if the administrator's account be
levacccp [35]

The security specialist has discovers a malicious script on a computer known as a logic bomb.

<h3>Is logic bomb a type of malware?</h3>

A logic bomb is known to be a form of a malicious program that is set up or ignited if a logical condition is met, such as after a series of transactions have been done, or on a given date.

Therefore, The security specialist has discovers a malicious script on a computer known as a logic bomb.

Learn more about malware from

brainly.com/question/399317

#SPJ1

7 0
2 years ago
Terminal emulation, especially the unprotected ____________________ protocol, should be blocked from any access to all internal
storchak [24]

Answer:

telnet

Explanation:

<h2><u>Fill in the blanks </u></h2>

Terminal emulation, especially the unprotected <u>telnet </u>protocol, should be blocked from any access to all internal servers from the public network.

3 0
3 years ago
Other questions:
  • The tone a writer takes is referred to as the writing _____.
    7·2 answers
  • If you wanted to create a graph that showed how much each value contributed to the whole value, you would use a _____.
    15·2 answers
  • Which of the following is the term for software that automatically displays or downloads unwanted offers?
    15·1 answer
  • What is an apprenticeship
    7·1 answer
  • Which of the following programs can open a bitmap file?
    11·2 answers
  • After the following code runs, what will be the value of result? var x = 30; function get () { return x; } function set (value)
    10·1 answer
  • 350 square feet requires 1 gallon of paint. Assign gallons_paint with the amount of paint required for wall_area. Sample output
    12·1 answer
  • Next, Leah wants to add a content slide that allows her to insert a table.
    8·2 answers
  • 1. Write a program to input four numbers and store them in variables.
    6·1 answer
  • Question 3 (2 points)
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!