1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
atroni [7]
3 years ago
13

I want to sign up for brainly but it won't let me. It keeps saying "we can complete your registration at this time".

Computers and Technology
1 answer:
vekshin13 years ago
5 0
Try reinstalling the app or check if your wifi connection is good, if everything’s good but the app still doesn’t work then just use the website
You might be interested in
An anagram of a string is another string with the same characters in the same frequency, in any order. For example 'ab', 'bca, a
nlexa [21]

Answer:

from collections import Counter

def anagram(dictionary, query):

   newList =[]

   for element in dictionary:          

       for item in query:

           word = 0

           count = 0

           for i in [x for x in item]:

               if i in element:

                   count += 1

                   if count == len(item):

                       newList.append(item)

   ans = list()

   for point in Counter(newList).items():

       ans.append(point)

   print(ans)        

mylist = ['jack', 'run', 'contain', 'reserve','hack','mack', 'cantoneese', 'nurse']

setter = ['ack', 'nur', 'can', 'con', 'reeve', 'serve']

anagram(mylist, setter)

Explanation:

The Counter class is used to create a dictionary that counts the number of anagrams in the created list 'newList' and then the counter is looped through to append the items (tuple of key and value pairs) to the 'ans' list which is printed as output.

4 0
3 years ago
External network security threats can include management failure to support organization-wide security awareness, inadequate sec
stiks02 [169]

Answer:

B. False

Explanation:

External security threat can be defined as any threats coming outside the company's computer network operation, usually carried out with negative or hostile intent for the purpose of stealing information or distracting the flow of operation. For example, Virus Attack

However, given that the question talked about the "management failure to support organization-wide security awareness, inadequate security policies, and unenforced security procedures."

Hence, this is not an External Security Threat, which means, the correct answer is FALSE.

5 0
4 years ago
List three functions that you can perform with a database that you cannot perform with a spreadsheet.
Delicious77 [7]
There are some function which can be performed with database but not with a spread sheet, these functions include: 
1. Enforcement of data type.
2. Support for self documentation.
3. Defining the relationship among constraints in order to ensure consistency of data.
5 0
3 years ago
There are four ways to create a macro? FALSE OR TRUE
Murljashka [212]

Answer: True

Explanation:

There are actually four ways to create a macro. You would want to use %let.

7 0
2 years ago
Read 2 more answers
Which system procedure is normally done with both hand valves opened on a gauge manifold connected to a refrigeration system?
mars1129 [50]

Answer:

The answer is "Evacuation".

Explanation:

The evacuation in coolants was its removal from the coolant of heat, air, and non-condensable toxic gases. Its seal HVAC system is drawn to a vacuum and use a pressure washer throughout this process.  

  • It loses the air and water vapor throughout the coolant point is called it.
  • The two primary goals are accomplished by evacuating, that are eliminates content and hydrates.
8 0
3 years ago
Other questions:
  • In order to identify the transmissions that belong to each VLAN, a switch will add a tag to Ethernet frames that identifies the
    8·1 answer
  • Why was Windows 1.0 considered an operating environment rather than an operating system?
    10·2 answers
  • What is a number system, and what is the total number of digits used in this system called?
    5·1 answer
  • I’ll mark brainliest if correct
    10·1 answer
  • Memememememmemememememememmmeememememe
    15·1 answer
  • Ashley has many interests. She likes to read, listen to music, and play soccer with her friends. But her favorite thing to do is
    9·1 answer
  • Convert this hexadecimal number to binary :. A07F​
    14·1 answer
  • 7. Malware could A. cause a system to display annoying pop-up messages B. be utilized for identity theft by gathering personal i
    10·1 answer
  • Which of the following is a method which can be used to delete a page from a publication?
    6·1 answer
  • Most cell phones and tablets have solid-state storage drives. internal hard disk drives. internal cloud storage. external hard d
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!