1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bazaltina [42]
3 years ago
13

When you write code to count the number of times red is the color, what is the index of "red"?

Computers and Technology
1 answer:
lorasvet [3.4K]3 years ago
7 0

Answer:

1

Explanation:

Remember it starts with 0. Correct on edge.

You might be interested in
How does having weak security on your browser represent the weakest link in a network
kozerog [31]

Answer:

1. Your location is always exposed "might not be a problem, until it is"

2. Computer Viruses as your browser allows them

3. Hackers, of course, Ransomware attacks

4. SpyWares, read terms and condition or atleast visit trusted sources

5. Phishing, intermediatte security can handle this risk, but fatal if not. as in online identity stolen, bank accounts accessed.

6...... ALWAYS STAY SECURED

YOU WERE NEVER THE TARGET, JUST THE VICTIM

5 0
3 years ago
What is one expectation of open-source software?
Mars2501 [29]

Answer:

my Answer is: free license

Explanation:

5 0
3 years ago
what should the timing of transition slides be per minute? maintain the flow of the presentation to ______ slides per minute.
murzikaleks [220]

Answer:

1-2

Explanation:

It depends on the amount of information that you have on each slide. You want to make sure you're not going too fast but also make sure you arent taking up to much time. Be sure to speak clearly it will make the presentation better by looking clean and time organized. hope this helps :)

8 0
3 years ago
What level of system and network is required for cui
galben [10]

Answer:

CUI will be classified at a “moderate” confidentiality level and follow DoDI 8500.01 and 8510.01 in all DOD systems. Non-DoD systems must provide adequate security with requirements incorporated into all legal documents with non-DoD entities following DoDI 8582.01 guideline

Explanation:

6 0
3 years ago
A _______ is used to analyze and summarize your data without graphical support.
hodyreva [135]
Pivot table is the answer
8 0
4 years ago
Other questions:
  • identify three of the many shared ethical standards among businesses that are incorporated in codes of ethics
    6·2 answers
  • Print the two strings in alphabetical order. assume the strings are lowercase. end with newline. sample output: capes rabbits
    5·2 answers
  • An automated search feature used by search engines to find results that match your search terms is called spider or
    13·1 answer
  • If a fuse block or holder has tree fuses, it may be termed a...
    7·1 answer
  • What Temperature does mainframe need
    15·2 answers
  • Which fraction represents the shaded part of this circle? 1 2 O 4 Check Answer /3rd grade/​
    14·2 answers
  • 1. What was the very first “photo-realistic CGI character” to appear on-screen in a movie (released in 1985)?
    8·2 answers
  • Need answer ASAP
    14·1 answer
  • Which of these is not enumerated as a motivation to create accessible web content?
    10·1 answer
  • What should you try first if your antivirus software does not detect and remove a virus?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!