1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
abruzzese [7]
3 years ago
6

Which stride number should you use to reverse the order of characters in a slice?

Computers and Technology
2 answers:
GuDViN [60]3 years ago
8 0

Thank you

That helps a LOT!!!

-Viki

S_A_V [24]3 years ago
3 0
These are the correct answers to the following questions:
<span>
1. Which stride number should you use to reverse the order of characters in a slice?
A. -1

2. What is forking?
c. Taking code from a currently developed project to make a different version

3. What is a bug?
B. An error in a program's code

4. The turtle program is a/an _________ included with Python that can be imported for use in Python code.
c. Module

5. What is a graphical user interface (GUI)?
b. The windows, buttons, menu items, icons, and dialog boxes with which a computer user interacts

6. Which of the following is an advantage of using variables?
D. It makes it less likely that an error will be introduced into the code.

7. What would you expect as the result of the code "happy" + "birthday"?
D. "happybirthday" 

8. When you make copies of a class, those copies are called _________ of the class.
D. Instances

9. What are methods?
A. The functions associated with a class

10. What are comments meant to do?
C. Explain what some code is doing

11. Which of the following types of software hides its code and doesn't let other people change it?
D. Proprietary software

12. If you want to save a program so you can run it later, you should create the program in which window?
b. The text editor window

13. A _____________ is a clickable graphical object that makes something happen when the user clicks it, usually with the left mouse button.
A. Button

14. A/an ____________ development method is one in which the development does not follow a predictable or planned course of action.
A. Informal

15. What are shortcuts useful for?
A. Making it easier and quicker to open a file
</span>
You might be interested in
______ norms are usually unstated rules that regulate members' interaction.
andrey2020 [161]
Hey there! Hello!

The answer to this problem is most likely group norms. The definition given above pretty much explains it: they're an unspoken/unwritten set of informal rules that dictate a group member's actions.
 
They allow for people to know how to act in social situations while also knowing who is acting out of place according to the group norms. It's a bit difficult to understand exactly what they are, since they are unstated and all. 

Hope this helped you out! Feel free to ask me any additional questions if you have any. 

–Lamb :-)
4 0
3 years ago
Which process is a feature of webmail?
GalinKa [24]
Your mail gets sent across the internet to the other person you mailed to.
7 0
3 years ago
A disadvantage of online surveys is that _________. a. it is difficult to access large numbers of potential respondents. b. they
Minchanka [31]

Answer:

B seems like the best answer to me.

Explanation:

7 0
4 years ago
Use computer magazines and/or the internet to investigate one of these DBMSs: DB2, SQL Server, MySQL, Oracle, or Sybase. Prepare
tigry1 [53]

Answer:

The definition for the problem is listed in the section below on the explanations.

Explanation:

<u>For SQL Server</u>

  • Data Recovery: Data recovery is done well on SQL Server. It is achieved by the restoration method. Behind this, a sysadmin must reconstruct a collection of SQL backups throughout a restore series that is technically right as well as relevant.
  • Data Security: There are several approvals as well as limits for accessing main data objects or databases. These data are accessed only by the approved clients.
  • Concurrency Control: This is essentially synchronization of the evidence or information accessed by multiple users as well as from separate locations.

Concurrency or Competitiveness control becomes accomplished with SQL Server Portable, using locking to further improve security. The locking regulates how multiple individuals can simultaneously navigate & alter shared storage, without interfering with one another.

8 0
3 years ago
How buffers are used when stream a video or a music from the internet to your computer.
jekas [21]

Answer:

Restart it.

Explanation:

8 0
3 years ago
Other questions:
  • What are the latest technology in 2014
    11·1 answer
  • Which charges a fee for access to read, research, or copy articles and other published materials?
    11·1 answer
  • A bank system mainframe is struck by a DDoS attack and goes offline. Customer’s cannot log on to their accounts. Which element o
    11·1 answer
  • The university computer lab’s director keeps track of lab usage, as measured by the number of students using the lab. This funct
    11·1 answer
  • The compiler determines the parameterized type in a function template ___________.
    13·1 answer
  • Filtering data in Excel Online keeps all data on the screen and highlights the content that fits your criteria.
    9·1 answer
  • Android OS "AFTER" Beta.<br><br> A. Cupcake<br><br> B. Candy<br><br> C. Cookie<br><br> D. Carmel
    12·1 answer
  • Your company's network topology diagrams aren't very detailed so you're helping to improve them. The new set will have separate
    9·1 answer
  • What is the sixth generation of style. When writing a paper.
    8·1 answer
  • Identify the type of software that should be in main memory in order to use the keyboard? *
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!