1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitry [639]
3 years ago
9

This is your code.

Computers and Technology
1 answer:
Tju [1.3M]3 years ago
4 0

Answer:

dog

Explanation:

Given the code :

>>> A = [21, 'dog', 'red']

>>> B = [35, 'cat', 'blue')

>>> C = [12, 'fish', 'green']

>>> E = [A, B, C]

the value of E[0][1]

Here, square boxes is used to select the value at E[0] ; the output is then used to select the value at index 1 of E[0] output.

Note that, indexing starts at 0; hence first list element is 0, then, 1, 2, and so on.

At

E[0] ; list E, index 0 (first element in the list) , gives an output A

Then, A[1] ; list A, index 1 (second element in the list) gives 'dog'

You might be interested in
What is the clearing house for domain names called?
denpristay [2]
Trademark cleaning house?
8 0
3 years ago
Why should teachers refrain from using extreme language, such as “I’m dying of hunger,” around four- and five-year-old children?
swat32

Answer:

Teachers of four and five year old children should refrain from using sentences such as "i'm dying of hunger," because children so young could take the death part of the comment to literally, they are small children, and do not yet fully understand the concept of figure of speech or over exaggeration.

3 0
3 years ago
Which type of attack broadcasts a network request to multiple computers but changes the address from which the request came to t
aivan3 [116]

Answer:

Smurf attack

Explanation:

In smurf attack is an attack of DDoS type, i.e., Distributed Denial of Service where a network request is broadcast to multiple systems but return IP address of the system sending the request is forged with the victim's IP address.

It is that type of DDoS attack where the Victim's system is flooded with spoofed ping packets. It left the system inoperable and is done by exploiting the Internet Control Message Protocol and IP of the system which is dangerous for both the sending end system and the victim's system.

8 0
3 years ago
Pros of mobile devices on young people during their free time
Elis [28]
Studies have shown that the people who spend more time on social media are better to show virtual empathy to their online friends 
8 0
3 years ago
what is a paragraph on what i can write on what i learned from watching basic keyboard shortcuts using control functions video
finlep [7]

Answer:

Write the following nonsensical paragraph:

Explanation:

I learned how to navigate the computer efficiently. I learned how to use Ctrl + (key) to quickly do (something). ( Now reword that multiple times with different commands. ) Now I can harness my inner laziness to browse the computer at a faster speed.

6 0
4 years ago
Other questions:
  • Ben buys an Olympus E-PL2 from Sony which starts malfunctioning. When he opts for an exchange, the customer representative says
    11·1 answer
  • List the six external parts or "peripherals" of a computer system and identify which are the output and which are the input devi
    6·1 answer
  • You use worksheets to perform calculations. How do you perform these calculations? ______ are used for performing calculations i
    12·2 answers
  • In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism b
    7·1 answer
  • I NEED IT NOWW
    13·2 answers
  • Is an applications program is a program designed to perform a specific task for specific users
    5·1 answer
  • Power point presentation make use of pages known as
    9·2 answers
  • Viruses and worms can affect a system by:
    11·2 answers
  • What is the purpose of exploring data?
    6·2 answers
  • This might be a bad question but what is an AMD Radeon 380 series equivalent to
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!