1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
viktelen [127]
3 years ago
6

60 POINTS IF YOU GET IT RIGHT

Computers and Technology
2 answers:
Kruka [31]3 years ago
6 0
Can you explain a little more , so I can help you better ?
bulgar [2K]3 years ago
4 0

Answer:

You said this was 60 points but it is only 30 points :(

Explanation:

You might be interested in
!WILL MARK BRAINLIEST!
laiz [17]

Answer:

It is can a user take a picture of the graffiti upload is and add it to a post

Explanation:

6 0
3 years ago
How to interchange first half of the array with second half of array in python?
damaskus [11]

Answer:

Following are the code to this question:

l= []#defining an empty list

n=int(input("Enter total element you want to insert: "))#defining variable to input total element

for i in range(0,n):# defining loop to input value in list

   insert=int(input())#defining variable insert to input value

   l.append(insert) # adding the elemenents into the list

x=n//2#calculating midpoint  

l1 =l[:x]#using slicing to hold first-half value in l1 list

l2 =l[x:]#using slicing to hold second-half value in l2 list

print("Before interchange: ")#print message

print ("list : ",l)#print input list

l3=l2 + l1#add value in l3

print("After interchange: ")#print message

#print(l3)  #print list l3

print (str(l3)[1:-1])#print list l3

Output:

please find the attachment.

Explanation:

Description of the code:

  • In the above python program, an empty list l is declared, in the next line, variable n is defined, that input the total number of the list elements. In the next line, the for loop is declared, which uses the insert variable input value and used the append method to add value in the list.
  • In the next step, the variable x is declared, which finds the midpoint of the list, and defines the l1 and l2 lists, that use slicing to hold the first and second half values.
  • In the last step, the l3 list is declared, that adds the l1 and l2 lists and use the print method to print its values.

8 0
3 years ago
A manager wants to set up an area that is not on the LAN but not quite on the Internet. This area will house servers that will s
andreev551 [17]

Answer:

1. DMZ  (Demilitarized zone)

Explanation:

In computer networking, a Demilitarized Zone is a physical or logical network designed to give an extra layer of security on the organization’s private network. The DMZ acts as an interface between an untrusted network such as the internet and the organization’s internal network. When a server is set up in a demilitarized zone, users can reach it via its public IP address. In case there is an attack on the server, the private network is still protected.

3 0
3 years ago
Technologies are having a negative impact on businesses.
Aloiza [94]

Answer: False

Explanation: I think its false because technologie has had a good impact on businesses.

4 0
3 years ago
Need the answer ASAP!!!
Vlad1618 [11]

Answer: type and create of the software

Explanation:

pls mark brainliest

6 0
3 years ago
Other questions:
  • 3k means about 3 thousand bytes. how would you express two hundred million bytes?
    8·1 answer
  • Frank is a writer. He needs to work for long hours and type for long periods on the computer. What injury can Frank develop?
    15·2 answers
  • How can people make sure they are using credit cards responsibly
    14·2 answers
  • Click _______ to view each individual record of a mail merge document.
    5·2 answers
  • Peter has recently bought a media player and a digital camera he wants to buy a memory card and then use devices which memory do
    11·2 answers
  • A franchise restaurant is attempting to understand if customers think their service is good day-to-day by summarizing a series o
    10·1 answer
  • You are system administrator with hundreds of host workstations to manage and maintain. You need to enable hosts on your network
    14·1 answer
  • Which of the following variable names follows the rules for naming variables?
    13·1 answer
  • Which of the following is not the disadvantage of closed
    7·2 answers
  • Name 3 things that you use daily that are considered computers?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!