1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mamaluj [8]
4 years ago
14

Can someone please help me on these short short questions marking Brainly computer modeling people please help

Computers and Technology
1 answer:
Hatshy [7]4 years ago
4 0

Answer:

8.True

9.idk sorry

10.I think true

11. at my school we used .blend extension idk about you

You might be interested in
Why save html documents as lowercase.?
astraxan [27]
Nowadays, it's really just convention to use lowercase file names.
3 0
4 years ago
(PYTHON) Write a program that uses this technique to read a CSV file such as the one given above. Display the IDs and names of t
Ludmilka [50]

Answer:

import csv

with open('employee_birthday.txt') as csv_file:

csv_reader = csv.reader(csv_file, delimiter=',')

line_count = 0

for row in csv_reader:

if line_count == 0:

print(f'Column names are {", ".join(row)}')

line_count += 1

else:

print(f'\t{row[0]} works in the {row[1]} department, and was born in {row[2]}.')

line_count += 1

print(f'Processed {line_count} lines.')

Explanation:

Heres an example of how to read csvs

7 0
3 years ago
In the absence of a cybersecurity theory, we have security standards, frameworks and best practices. An example of best practice
Galina-37 [17]

Answer:

a. to use a password of a certain composition and strength, such as minimum 8 characters.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

In the absence of a cybersecurity  theory, we have security standards, frameworks and best practices.

An example of best practices in cybersecurity is the use of a password of a certain composition and strength, such as minimum 8 characters. This would ensure there's a formidable wall to protect data and an unauthorized access or usage of the system network.

7 0
4 years ago
Read 2 more answers
Whoever reads this can you ask more undertale questions plz
sineoko [7]

this is not a question

5 0
4 years ago
Read 2 more answers
To initialize a String array names to store the three Strings "Huey", "Duey" and "Louie", you would do:
Alina [70]

Answer:

B) String[ ] names = {"Huey", "Duey", "Louie"};

Explanation:

In Java programming language, arrays are declared by first Writing the data type of the elements that will be stored in the array, in this case String. This is followed by square brackets indicating that the variable is an array, followed by the array name which must follow the rules of naming variables. The example below is a valid declaration of an array.

 String[ ] names;

Next in java we can initialize the elements either by using the new keyword and specifying the length of the array to create the array in memory like this;

String[ ] names = new String[3];

Or we initialize by assigning values in curly braces seperated by commas like in the question ablove.

7 0
4 years ago
Other questions:
  • hey computor guys. is the MSI B250M GAMING PRO LGA 1151 Intel B250 HDMI SATA 6Gb/s USB 3.1 Micro ATX Motherboards - Intel compat
    8·1 answer
  • Choose all that apply.
    6·2 answers
  • Which country has the best land soldier​
    13·2 answers
  • There are n coins, each showing either heads or tails. We would like all the coins to show the same face. What is the minimum nu
    6·1 answer
  • An 8x16 font isstored in _________________ bytes.<br> ? 8<br> ? 16<br> ? 4<br> ? 20
    13·1 answer
  • When Google created its China-based search engine www..cn, they did not foresee eventually abandoning it because of censorship i
    12·1 answer
  • Summarise all what you know about spss​
    15·1 answer
  • How can using Prezi software for a presentation allow the presenter to better respond to audience needs?
    10·1 answer
  • 8.4 Lesson Practice <br> edhesive quiz
    12·1 answer
  • The second purpose of government regulation is to​ _____________________.
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!