1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
frozen [14]
2 years ago
9

Ryan would like to copy a list of contacts from a colleague into his personal address book. The list of contacts is

Computers and Technology
1 answer:
Colt1911 [192]2 years ago
5 0

Answer:

He should: Format the text file with comma-separated values and save as CSV file type. ]

Explanation:

hope this helps!

You might be interested in
Write a (java) program with a class called Sum1, using a while loop to add 10 numbers entered from the key-board.
Ainat [17]

This is a java program with a class called Sum1.

Explanation:

While loop is used to add 10 number.

import java.util.Scanner;

public class Sum 1

{

   public static void main(String args[])

   {

       int number, count, sum = 0;

       Scanner s = new Scanner(System.in);

       System.out.print("Enter the number:");

       number = s.nextInt();

       while(number > 0)

       {

           count = number % 10;

           sum = sum + n;

           number = number / 10;

       }

       System.out.println("Sum of Digits:"+sum);

   }

}

5 0
3 years ago
Adassadad saflalfaklfajfklajfalkfjalkfjalkfalkf
BlackZzzverrR [31]

Answer:

this belongs on r/ihadastroke

Explanation:

5 0
3 years ago
Read 2 more answers
To protect the computer network of a large organization, network engineers monitor network traffic. This traffic is compared to
ioda

Answer:

To protect the computer network of a large organization, network engineers monitor network traffic. Malware detection method of data mining best being used to protect the network.

Explanation:

Data mining has excellent potential as a malware detection tool. It allows us to analyze vast sets of information and gives an opportunity to extract new data from it. It also provides the ability to identify both known and zero-day attacks.

5 0
2 years ago
Read 2 more answers
Software, also called a(n) ____________________, consists of a series of related instructions, organized for a common purpose, t
Naddika [18.5K]
Software is also called a program or an application.
8 0
3 years ago
From a neural network with 11 input variables, one hidden layer with three hidden units, and one output variable, how many param
e-lub [12.9K]

Answer:

40

Explanation:

Given that:

A neural network with 11 input variables possess;

one hidden layer with three hidden units; &

one output variable

For every input, a variable must go to every node.

Thus, we can calculate the weights of weight with respect to connections to input and hidden layer by using the formula:

= ( inputs + bias) × numbers of nodes

= (11 + 1 ) × 3

= 12 × 3

= 36 weights

Also, For one hidden layer (with 3 nodes) and one output

The entry result for every hidden node will go directly to the output

These results will have weights associated with them before computed in the output node.

Thus; using the formula

= (numbers of nodes + bais) output, we get;

= ( 3+ 1 ) × 1

= 4 weights

weights with respect to input and hidden layer total = 36

weights with respect to hidden and output layer total = 4

Finally, the sum of both weights is = 36 + 4

= 40

6 0
2 years ago
Other questions:
  • Make three statements about technology
    9·1 answer
  • At a local burger chain, a customer became extremely angry. Everyone took notice at the person, who was yelling at anyone he cou
    10·2 answers
  • Which of the following is the best definition of a workplace policy?
    13·2 answers
  • Define a romanNumberToInt function that converts a RomanNumber value, which is a list of Roman digits, into an integer. Hints: -
    7·1 answer
  • The main screen of wireshark includes several shortcuts. which shortcut category displays a list of the network interfaces, or m
    15·1 answer
  • Why would businesses apply cell protection to spreadsheet entries? Provide one specific example.
    10·1 answer
  • In order to detect repeated lines anywhere in the input, myuniq must keep track of all of the lines it has seen as it moves thro
    9·1 answer
  • Need the answer ASAP plz !!!!!
    7·1 answer
  • Which file formats have relatively small file size and are therefore the most widely used formats for sharing and
    12·2 answers
  • Range paramters - for loop<br> question in picture
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!