1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ZanzabumX [31]
2 years ago
12

A person you respect who offers you advice and assistance is known as a(n) _____.

Computers and Technology
1 answer:
Archy [21]2 years ago
7 0
This would be a mentor-D. They role is to mentor or guide you with advice or assistance. A role model is a similar answer in that they respect you, but they might not offer advice or assistance which makes it incorrect.
You might be interested in
Which of the following best explains the concept of a prototype
gladu [14]
A prototype<span> is an early sample, model, or release of a product built to test a </span>concept<span> or process or to act as a thing to be replicated or learned from. It is a term used in a variety of contexts, including semantics, design, electronics, and software programming.</span>
3 0
2 years ago
Namespaces are guaranteed to be unique.<br><br> True<br><br> False
kupik [55]

Answer:

True

Explanation:

Some collection of classes or library functions grouped as one name space. A class which belongs to one namespace is different from the class which belongs to another namespace. we can identify a class uniquely with it's namespace .

for ex:

in c#.net

using system;

System.IO;

here System is the namespace which contains class IO

namespace contains any number of classes . In one namespace we can't define two classes with same Name. We can define two classes with same name in different namespaces

5 0
3 years ago
A teacher wants a program to give extra points to students who fail a test. Write a Python program to do the following: (a) Ask
Lorico [155]

Answer:

Hi there! Please find the answer below.

Explanation:

The program below demonstrates how each of the requirements can be coded in a simple Python script. To copy the array, we can use the copy() method of the array. To calculate the diff, we can use a few different techniques, so I have implemented it using a loop over the arrays and just storing and displaying the difference in the 2 arrays.

new_string.py

def add_test_score(score):

 test_score.append(score);

contact_hash = {}

test_score = []

print("Enter 5 test scores: ");

for x in range(0, 5):

   input_string = input("Enter test score " + str(x + 1) + ": ")

   add_test_score(int(input_string));

print(test_score);

test_score_copy = test_score.copy();

for e in test_score_copy:

   if e < 60:

       test_score_copy[test_score_copy.index(e)] += 10;

diff = [];

for e in test_score:

   print(test_score[test_score.index(e)]);

   print(test_score_copy[test_score.index(e)]);

   if not test_score[test_score.index(e)] == test_score_copy[test_score.index(e)]:

       diff.append(e);

print(diff);

8 0
3 years ago
COULD U ANSWER THIS ???
vladimir1956 [14]

Answer:

B.lightning striking a tree

Explanation:

The crowd dispersing in all directions is not a closed-loop by any means, and students jogging around an oval track as well is not a closed-loop, and also not a cross country run from one point to another. However, the lightning striking a tree is a closed loop that best models a circuit. And as lightning strikes the tree, like a closed circuit, tree catches the fire, or in circuitry words, the current is generated, and tree catches the fire due to it, just like bulb starts glowing.

3 0
2 years ago
How can security professionals use software to recover stolen laptops ?
inna [77]

<u>Answer is:</u>

E). They monitor email traffic.

<u>Explanation:</u>


Track Your Device's IP Address with mail. If your laptop or smartphone was stolen, you can use a service like mail to find the IP address of your thief. When you log into those services from any computer, it logs the IP address used, and displays your last used IP in your account. So, these are source for finding the stolen laptop and smartphones.

I hope you got the idea. Thanks

3 0
3 years ago
Other questions:
  • The combination of two or more technologies or data feeds into a single, integrated tool is referred to as a _____.
    7·1 answer
  • Select the correct answer. Which sentence best describe an effective management strategy? A. Conceal game-related clippings prio
    12·2 answers
  • All queries have an explicit location. true of false
    13·2 answers
  • Sally needs to copy data from the first worksheet to the fifth worksheet in her workbook. Which combination of keys will she use
    6·2 answers
  • The benefit of host and guest operating system difference is:
    8·2 answers
  • __________ is a growing practice in cooperative farmingassociations to pool and sell the fruit as a common commodity underthe br
    6·1 answer
  • What is the component on the motherboard that confirms all devices are in working order once the computer is turned on?
    13·1 answer
  • I WILL GIVE BRAINLIEST TO WHO ANSWERS FIRST AND CORRECTLY.
    8·1 answer
  • What are the features of a computer speaker​
    10·1 answer
  • Why don’t the ads on Brainly load anymore
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!