1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
N76 [4]
2 years ago
5

The February Revolution occurred in January. True False

Computers and Technology
2 answers:
zimovet [89]2 years ago
7 0
The answer would be false. 
Elis [28]2 years ago
7 0

Answer:false

it took place in March 8 - 16, 1917

You might be interested in
Which implementation uses both the legacy system and new system until all users verify that the new system functions correctly?
olasank [31]

Answer:

Explanation:

One group of students did an experiment to study the movement of ocean water. The steps of the experiment are listed below.

Fill a rectangular baking glass dish with water.

Place a plastic bag with ice in the water near the left edge of the dish.

Place a lighted lamp near the left edge of the dish so that its light falls directly on the plastic bag.

Put a few drops of ink in the water.

The student did not observe any circulation of ink in the water as expected because the experiment had a flaw. Which of these statements best describes the flaw in the experiment? (2 points)

Not enough ink was added.

Not enough water was taken.

The dish was too small for the experiment.

The lamp and the ice bag were at the same place.

3 0
3 years ago
Why does a print document need a higher raster effect setting ?​
mario62 [17]

Answer:

gives label artwork a professional, polished look.

Explanation:

6 0
3 years ago
What is a scenario where records stored in a computer frequently need to be checked
vazorg [7]

if your in  school and always are getting into trouble the school will always be checking your records


7 0
3 years ago
Read 2 more answers
Statement: There are two files. One file, "badIP_list.txt" has a listing of known bad IP addresses. These addresses were extract
lapo4ka [179]

Answer:

See explaination

Explanation:

SOURCE CODE IN PYTHON:

inp=open('badIP_list.txt', 'r') #opening file for input

badIPs=[i.rstrip('\n') for i in inp.readlines()] #reading bad IPs

inp.close() #closing file

inp=open('server_logs.txt', 'r') #opening file for input

IPs=[i.rstrip('\n') for i in inp.readlines()] #reading all IPs from log

inp.close() #closing file

uniqueBadIPs=[] #to store unique bad IPs

countBadIPs=0 #to store count of bad IPs

countIPs=0 #to store count of all IPs

for IP in IPs: #iterating through the log of IPs

if IP in badIPs: #checking if IP is bad

countBadIPs+=1

if IP not in uniqueBadIPs: #checking if bad IP is unique

uniqueBadIPs.append(IP)

countIPs+=1

out=open('filter_list.txt', 'w') #opening file for output

out.write('_________________________________________________________\n')

out.write('Date : 26/07/2018\nName : Last, First\nMajor: CS\n\n')

out.write('Server logs contained these known bad IP addresses:\n')

for IP in uniqueBadIPs: #output the unique bad IPs

out.write(IP+'\n')

out.write('\n')

out.write('Total unique known bad IP\'s detected:\n'+str(len(uniqueBadIPs))+'\n\n')

out.write('Percentage of bad IP addresses in server logs:\n{:.2f}%\n'.format(countBadIPs*100/countIPs))

out.write('_________________________________________________________')

out.close() #closing file

5 0
3 years ago
During email encryption, the system creates which type of key to allow the user to send an encrypted email?
kiruha [24]
A hope this is correct just read an article on it
5 0
3 years ago
Read 2 more answers
Other questions:
  • In excel what does sidney need to consider when creating formulas
    7·1 answer
  • 8) Which of the following statements is FALSE?
    14·1 answer
  • Technician A says that wheel speed sensors are a highly probable cause of illuminated EBC warning lamps. Technician B says that
    10·1 answer
  • To keep you from inadvertently moving controls as you work in the IDE, click the form or control, then click the _________ optio
    15·1 answer
  • Of the key reasons for creating organizational units which of the following is not one of them?
    13·1 answer
  • Int a = 1; int b = 0; int c = -1; if ((b + 1) == a) { b++; c += b; } if (c == a) { a--; b = 4; }
    7·1 answer
  • Explain the working system of computer systems with examples​
    14·1 answer
  • What do we call the software program that handles the communication between a peripheral device and your computer?
    8·2 answers
  • Which version of HTML provides the lowest common denominator of HTML tags
    8·1 answer
  • Which of the following offers a combination of the features of ram and rom?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!