1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sloan [31]
3 years ago
13

Explain how to utilize the computer in rooms management.​

Computers and Technology
1 answer:
Nadya [2.5K]3 years ago
5 0
Hiiiiiiiiiiiiiiiiiiii bro
You might be interested in
What does gigabyte mean
son4ous [18]
A unit of information equal to one billion {109} or, strictly 230 bytes
4 0
4 years ago
Five features of any window​
Vesna [10]

Answer:

The features of any windows are

1. Start menu

2. Notification area or task bar

3. Window snipping tools

4. Using Local Area Networks

5. Windows explorer libraries

Explanation:

8 0
3 years ago
Who initially developed what is now known as the internet?
Lyrx [107]

in 1990, when computer scientist Tim Berners-Lee invented the World Wide Web.

5 0
3 years ago
What is not an example of ai
BARSIC [14]

Answer:

human

Explanation:

because it is not a machine

8 0
3 years ago
Read 2 more answers
If my_string = "This is MY string!", why does print (my_string[0:7:5]) return "Ti" and not
notka56 [123]

In Python, a string is an array of characters, we can access these characters using index operator []. For example, we have a_string = "Hello World" a_string[0] prints the first character in string ('H').

We can also use index operator to make substrings, for example a_string[0:3] will make a substring with first, second, third and fourth character equal to "Hell".

Now to business

my_string = "This is MY string!"

print(my_string[0:7]) # Prints "This is "

print(my_string[0:7:5]) # Prints "T" then prints the sixth character since we start counting at 0 hence prints "Ti" (note that space is also a character).

Hope this helps.

7 0
4 years ago
Other questions:
  • The home page box will only appear with what people you may know
    12·1 answer
  • A(n) _________ is a formal access control methodology used to assign a level of confidentiality to an information asset and thus
    6·1 answer
  • In a fully underwritten offering a firm sells 1 million shares of stock through a fully underwritten offering. Their banker char
    10·1 answer
  • What is the meaning of heart symbol in facebook?
    14·1 answer
  • For each of the descriptions below, perform the following tasks:
    11·1 answer
  • When you cut and then paste a file, what are you doing?
    7·2 answers
  • How do you create a IOS app?
    12·1 answer
  • An articulated robot has a T-type wrist axis that can be rotated a total of 2 rotations (each rotation is a full 3600 ). It is d
    15·1 answer
  • What is the output for the following program?
    6·2 answers
  • A student wrote a song. Another student posted a video of the song on You Tube, claiming to have written the song. This is most
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!