1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nataly [62]
3 years ago
12

What is an example of a hard skill?

Computers and Technology
2 answers:
Ksju [112]3 years ago
7 0

Answer:

Software programming

Explanation:

The skills that are required to complete the job or task successfully. These skills includes programming, writing, designing,or typing skills.

In question only 1st is the best example of hard skills. Rest of the options are example of soft skills.

Serjik [45]3 years ago
4 0
3 would be self management
You might be interested in
What is the output of the code below assuming that global variable x has value 2 and global y has value 3? def f1(): return "ab"
Lostsunrise [7]

Answer:

ababababab

Explanation:

The code above is written in python and python uses indentation .So let me rephrase the code accordingly and explain what the code really do.

Note x and y is a global variable which can be used by any of the function declared.  According to the question x and y are 2 and 3 respectively

The first block of code describes a function f1 without any argument but the code should return the string "ab"

def f1():

      return "ab"

The second block of code defines a function f2 and returns the value of f1 multiply by x. This means you are multiplying the string "ab" by 2 which will be equals to abab

def f2():

           return f1() * x

The third block of code declared a function f3 and returns the sum of  f2 and product of f1 and y. using PEMDAS principle the multiplication aspect will be solved first so, ab × 3 = ababab, then we add it to f2  . ababab + abab = ababababab.

def f3():

        return f2() + f1() * y

Finally, we print the function f3 value to get ababababab

print(f3())

If you run the code on your IDE like below you will get  ababababab

x = 2

y = 3

def f1():

      return "ab"  

def f2():

      return f1() * x  

def f3():  

      return f2() + f1() * y  

print(f3())

     

7 0
3 years ago
Assume we perform a known-plaintext attack against DES with one pair of plaintext and ciphertext. How many keys do we have to te
nasty-shy [4]

Answer:

2^{55} keys in a worst case scenario

Explanation:

So, Average will be : 2^{56} /2

2^{55}(Answer)

5 0
3 years ago
Which of the following is the best definition of metatheatre?
grandymaker [24]

Answer:"Metatheatre" is a convenient name for the quality or force in a play which challenges theatre's claim to be simply realistic -- to be nothing but a mirror in which we view the actions and sufferings of characters like ourselves, suspending our disbelief in their reality.

Explanation:

7 0
3 years ago
You should adopt naming standards that do not convey information to potential system attackers.
Nonamiya [84]
True








------------------------------
5 0
3 years ago
Why is https used in every link of a website?
d1i1m1o1n [39]

Answer:

As a request-response protocol, HTTP gives users a way to interact with web resources such as HTML files by transmitting hypertext messages between clients and servers. HTTP clients generally use Transmission Control Protocol (TCP) connections to communicate with servers.

6 0
3 years ago
Other questions:
  • What is the only true way to wipe out every possibility of the virus?
    11·1 answer
  • What is a critique of the feature detector model of object recognition?​?
    8·1 answer
  • What pointer appears when pointing to a hyperlink
    9·2 answers
  • SONET: is a standard for optical transmission that currently operates at Terabit per second speeds is almost identical to the IT
    7·1 answer
  • a_____________ may have its value change during program execution. options. flowchart,counter, Algorithm,None of them​
    15·1 answer
  • What expressions will initialize d with a random value such that all possible values for d are given by the inequality 1.5 ≤ d &
    8·1 answer
  • What is the danger of open-source software when it comes to military robotics?
    13·1 answer
  • Write an application that displays the sizes of the files lyric1.txt and lyric2.txt in bytes as well as the ratio of their sizes
    15·1 answer
  • Write a method that computes the average of the values in an array of doubles. The header of the method is as follows:
    14·1 answer
  • The CIBER network provides a link between the human resource and technology needs of a company with the research capacities and
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!