1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Liula [17]
3 years ago
9

Son opciones de configuración espacio multimedia llamado blog

Computers and Technology
1 answer:
Softa [21]3 years ago
6 0

NSaAnswer:

th

Explanation:

nks

You might be interested in
Write an algorithm in pseudo code to find the product of two numbers​
Vadim26 [7]

Answer:

Read num1 , num2

Set multi to num1*num2

Write multi

Explanation:

7 0
3 years ago
The function below takes a single argument: data_list, a list containing a mix of strings and numbers. The function tries to use
Nataliya [291]

Answer:

Explanation:

The Python code that is provided in the question is correct just badly formatted. The snippet of code that states

return new_list

is badly indented and is being accidentally called inside the if statement. This is causing the function to end right after the first element on the list regardless of what type of data it is. In order for the code to work this line needs have the indentation removed so that it lines up with the for loop. like so... and you can see the correct output in the attached picture below.

def filter_only_certain_strings(data_list):

   new_list = []

   for data in data_list:

       if type(data) == str and len(data) >= 5:

           new_list.append(data)

   return new_list

6 0
3 years ago
compare the use and style of business letters and electronic communicstion, such as e-mail or secure messaging within the emr.
RSB [31]

Answer:

Some of the differences that can be found in this communication means are: the time of reception and response, impression methods, presentation, resources invested, environmental impact.

Explanation:

In today's world it is possible to have endless possibilities in terms of the means of communication through which we can send a message effectively. In the past before the technological era that we are living at the moment, the most common form of communication was the business letters that were normally constituted in a very formal way since its writing, its impression, the way in which it was physically distributed its information, its envelope and the time of diffusion also had to be a little more extensive.

Now according to the technological advances and all the benefits that technology offers us, e-mail is the most efficient form of communication even for companies, who have been able to adapt satisfactorily the characteristics of the messages contained therein in order to achieve a formal communication in the same way and transmit the message in a much faster and more effective way, without having to spend on prints, luxurious envelopes and the sending of the physical document and can also leave a record of the sending of the information. In addition the e-mail can not only be used for formal communications but for any type of communication that is necessary, almost immediately and very effectively, with a low impact in the environment with less use of paper.

6 0
3 years ago
Find a password that "breaks" zxcvbn, i.e. it is probably easy to crack but zxcvbn reports that it has a cracking time of centur
levacccp [35]

Answer:

C0r3CtPP4zzu0Rd

Explanation:

zxcvbn is a password security and "strength" meter. This meter can identify password repetitions and patterns that will make it easier for some of your passwords to be discovered and your account to be hacked. This meter has as easy passwords to be discovered passwords that have dates, popular words or phrases, personal names and etc.

For zxcvbn to consider a password as strong, which would take centuries to be discovered, it is recommended that two words are used. In addition, these words must have a combination of uppercase and lowercase letters, numbers and symbols.

In this case, we can consider that the password "C0r3CtPP4zzu0Rd" is an easy password that could break zxcvbn.

If you pay attention, the password shown above is a code for the words "correct password", however, there is a combination of letters, numbers and symbols that follow a logical sequence and easy to be memorized, however zxcvbn would consider a * that it would take centuries to be discovered.

5 0
3 years ago
Daniel wants to redesign the user interface. The customer service agents use ________ to enter explicit statement to invoke oper
seropon [69]

Answer:

b. Command language interaction

Explanation:

Daniel wants to redesign the user interface. The customer service agents use Command language interaction to enter explicit statement to invoke operations within the system and cannot always remember the commands.

3 0
3 years ago
Other questions:
  • Ten 9600-bps lines are to be multiplexed using TDM. a. Ignoring overhead bits in the TDM frame, what is the total capacity requi
    6·1 answer
  • Binary search requires that the data to search be in order.<br> True or false
    13·1 answer
  • When viewing data entered into a spreadsheet, the columns identify _____.?
    5·1 answer
  • A(n) ________ is a variable that receives an argument that is passed into a function. global argument scope parameter
    15·1 answer
  • Which of the following is a narrative essay most like?
    10·2 answers
  • Does functionality provided by the app play an important role in a decision to
    13·1 answer
  • Refer to the following statement: “We have implemented several IT solutions:
    14·1 answer
  • A(n) ____ investigation tracks all elements of an attack, including how the attack began, what intermediate devices were used du
    5·1 answer
  • In your opinion, why did Proponents<br>of IPs used IPV6 instead of IPv5​
    7·1 answer
  • How is unqualified assumptions a disadvantage of communication​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!