1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetradugi [14.3K]
4 years ago
15

Hi I need help, This assignment is for Assignment 6 Question 3 in edhesive for computer science. here is the prompt:

Computers and Technology
1 answer:
miv72 [106K]4 years ago
6 0

Answer: print("THIRD")

for i in range(10):

   for j in range(10-i):

       print(" ", end=" ")

   for j in range(i):

       print("*", end=" ")

   print("")

Explanation:

You're Welcome yall

print("THIRD")

for i in range(10):

   for j in range(10-i):

       print(" ", end=" ")

   for j in range(i):

       print("*", end=" ")

   print("")

You might be interested in
When determining the cost of an item, the seller will often analyze the demand as well as the supply before setting the price of
juin [17]

Answer:

The price of a commodity is determined by supply and demand. therefore the answer is COMMODITY. that other person is wrong

7 0
3 years ago
When a policy setting in Computer Configuration and User Configuration in the same GPO conflict, the Computer Configuration poli
Maru [420]

Answer:

True

Explanation:

Computer Configuration policy applied first. This happens when the Computer system boots up. Then the user policy is applied when the user logs on. This takes place when the user object is in the same organizational unit.

So Computer Config policy setting takes precedence. User configurations is applied to local users only while computer configuration is applied to the machine itself. First the Computer GPO is applied and then the User GPO.  Loopback processing in replace mode enforces the Computer GPO over the user GPO.

8 0
4 years ago
What does a program do when it needs to read a file?
Alja [10]
Hello <span>Quinshayewilli7701 </span>

Question: What does a program do when it needs to read a file?<span>
Answer: It goes the address area, which is the front of the hard drive with the links to the areas on the hard drive where the file is located.

Hope This helps
-Chris</span>
5 0
3 years ago
What is design reference threat
timofeeve [1]
It’s a threat ‘make it spicey’ so with design
3 0
3 years ago
_____ involves identifying and controlling the functional and physical design characteristics of products and their support docu
slamgirl [31]

Answer:

The correct answer to the following question will be Option C (Configuration management).

Explanation:

  • A method of device engineering to create and maintain continuity of the functionality, operational and physical characteristics of software with its specifications, configuration and operating details across its existence.
  • You will gain profit from:

Decreased risk of interruptions and data leaks through accessibility and keeping track of adjustments to your devices by implementing configuration management.

The remaining three solutions will not be capable of performing these functions. Therefore, the correct answer is alternative C Configuration management.

5 0
3 years ago
Other questions:
  • When should you check to see that fuel lines, connections, and fuel vents are in good condition?
    7·1 answer
  • In a _____, if any link between nodes is severed, the entire network is affected, and failure of a single node disrupts the enti
    9·1 answer
  • A cracked tone (reluctor) ring will often cause what type of problem
    13·1 answer
  • Describe data center technology and its relevance to modern-day cloud computing
    14·1 answer
  • Function countValues = CreateArray(endValue) % endValue: Ending value of countValues
    7·1 answer
  • Given the declaration Circle x = new Circle(), which of the following statements is most accurate?
    11·1 answer
  • Write a test program that prompts the user to enter three sides of the triangle (make sure they define an actual triangle), a co
    5·1 answer
  • What is the most common etical rule that must be applied in all technologies​
    5·1 answer
  • How did these social media platforms affect or change the way you communicate with other people?
    10·1 answer
  • What search operator would you use with the word "Android" to find Android phone, Android smartphone, and Android cell phone?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!