1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
levacccp [35]
3 years ago
6

What will you see on the next line?

Computers and Technology
2 answers:
castortr0y [4]3 years ago
7 0

Answer:

[5, 10, 6, 32]

Explanation:

did on edge, have a good one

babymother [125]3 years ago
4 0

Answer:

[5, 10, 6, 32]

Explanation:

did on edge, have a good one

You might be interested in
A. True
kupik [55]
If the coder is unable to locate a code that describes the exact service provided, it is acceptable to use a code approximates the services provided. TRUE, the coder should be able to come up with a code for that is what they provide.
7 0
3 years ago
Non-delivered goods, counterfeit products, fraudulent payments are common type of cyber crime these
Arisa [49]

Answer:

a. Internet auction fraud

b. Counterfeit products are products made and/or sold under the brand name of a product of a higher quality

c. 1) Monitor business transactions

2) Use an Address Verification System AVS

Explanation:

a. Such types of cyber crimes are collectively called Internet auction fraud

Internet or online auction fraud is a form of fraud that involves the act of providing misleading information about goods paced on advert for sale on an online auction site, including the sale of counterfeit goods, sale of goods of poor quality, receiving a different item from what was ordered, artificial bidding to increase price, omission of important information about a product, delivering an item that looks different from what was displayed on the website and the non-delivery of an item already to the buyer.

A seller can be a victim of the internet auction fraud when a buyer does not pay for goods an/or services received, request for delivery before payment, the buyer pays with a stolen credit card, the buyer uses a fake escrow account such that the money returns to the buyer after receiving the goods

b. Counterfeit products or goods are products that are being manufactured and marketed, without formal authorization, under the name of a popular and recognized but are usually of lesser quality than the product they try to imitate

c. Measures that can be taken to stop fraudulent payments are;

1) Monitor transactions to to check for red flags, including disparity in shipping and billing information

Monitor transactions from customer that use free or anonymous emails services which can easily be opened and closed without payment or proper  documentation

2) Make use of Address Verification System to authenticate the billing address on a payment, and the address on the credit card.

7 0
3 years ago
CodeHS Python Rainforest Exercise 5.4.7: Categories
Butoxors [25]

Answer:

List1=[['Physics','Quantum Physics','Theory of Relativity'],['Geometry', 'Plane Geometry', 'Coordinate Geometry']]

i=0

k=0

for i in range(0,2):

   print("Category:"+List1[i][0])

   for k in range(1,3):

       print("\t"+List1[i][k])

   

Explanation:

The program required is mentioned above. And it has limitations, but is good enough to explain the fundamentals required.

6 0
4 years ago
Hey guys im just curious.... whats ur favorite number
Oksana_A [137]

Answer:

13

Explanation:

8 0
3 years ago
Read 2 more answers
Assume that name is a variable of type string that has been assigned a value . write an expression whose value is the first char
4vir4ik [10]

For the first question, you would just add the parenthesis to the string mutation1:

String word = "sadly";

String mutation1 = "(" + word + ")";

For the second you need the method substring from the String class:

It is defined as String.substring(begining, ending);

String name = "Smith";

String firstCharacter = name.substring(0, 1);

0 is considered the beginning of the string, then you get the next 1 characters.

7 0
3 years ago
Other questions:
  • ____ refers to the ability of one computing device (a desktop computer, portable computer, or smartphone, for example) on a netw
    12·1 answer
  • How do I convert a number into a percentage in excel
    7·1 answer
  • What skills and characteristics do you think would be necessary for a lighting board operator to be successful?
    8·2 answers
  • What will be the value of i after the C statements at the right have been executed
    6·1 answer
  • Which router feature, when enabled, helps computers on the local network automatically discover and communicate with services pr
    12·1 answer
  • You can invoke or call a method from another program or method. When methods must share data, you can pass the data into and ret
    6·1 answer
  • Given an array a, write an expression that refers to the first element of the array .
    5·1 answer
  • Complete the code to convert a float to a string. <br> answer=5.3 <br> strAnswer=__ (answer)
    12·2 answers
  • What are the benefits of computer literacy?
    10·1 answer
  • Which format has the largest file size?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!