1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
skelet666 [1.2K]
3 years ago
15

Can I get the code for the Edhesive Assignment 3 Chatbox in python? Thanks.

Computers and Technology
1 answer:
kirza4 [7]3 years ago
7 0
Sure it’s 5VD8H, dishskdnbdbsjakaksmxnxbhsjsnxnxn
You might be interested in
Select the correct answer.
Sladkaya [172]

Answer:

B

Explanation:

hes not presenting, word processing or making spreadsheets and multimedia software can be used to make music

5 0
3 years ago
Read 2 more answers
A network administrator has been creating a baseline of network performance. During this process, he realizes that one router is
LiRa [457]

If the network administrator found that one of his routers is slow in performance better to check the traffic packet transactions. If any huge file size is been transferred better to disconnect the router and reconnect.

Possible to kill the network task packet so the network speed can be restored.

<u>Explanation:</u>

Moreover, possible to scan the end-user PC or workstation or desktop whether any malware or spyware is affected, if so better to remove that particular PC or workstation or desktop to disconnected from the router.

Updating the PC or workstation or desktop OS patches to be done at regular intervals.

5 0
3 years ago
What is output if the user enters -5?
7nadin3 [17]

Answer:

The left

Explanation:

6 0
2 years ago
Read 2 more answers
During an investigation of a cybercrime, the law enforcement officers came across a computer that had the hard drive encrypted.
borishaifa [10]

Answer:

b. Try to convince the owner of the computer to give you to decryption key/password.

Explanation:

Encrypted hard drives have maximum security and high data protection. to access them you need to enter a password to unlock them.

The image filtering technique is a method that serves to selectively highlight information contained in an image, for which it does not work.

The encryption algorithm is a component used for the security of electronic data transport, not to access data on an encrypted hard drive.

The encryption key is used in encryption algorithms to transform a message and cannot be exposed by disconnecting the hard drive from its power source.

4 0
3 years ago
Use System.DateTime along with System.Console to implement a simple C# program that does the following:_______.
Andre45 [30]

Answer:

5

Explanation:

I did it to and it was right

3 0
3 years ago
Other questions:
  • Assume that play_list refers to a non-empty list, and that all its elements are integers. Write a statement that associates a ne
    7·1 answer
  • If johanna wants to label the x- and y-axes, she should click Layout, then
    8·1 answer
  • What is the printout of the call nPrint("a", 4)?
    14·1 answer
  • How to get this on your screen in 2k20 on Xbox
    14·2 answers
  • Car batteries have two terminals which are (blank).
    8·2 answers
  • analyze the ethical issues in the use of information technology in Multinational company (MNC) and support you answer with one e
    15·1 answer
  • Write a method that takes a RegularPolygon as a parameter, sets its number of sides to a random integer between 10 and 20 inclus
    10·1 answer
  • Why is lateral reading an important tool when reading material in social media or any online source
    15·1 answer
  • Each student has a record on a file consisting of the following data: Student last name, Student ID (numeric), GPA (a decimal nu
    7·1 answer
  • WHAT ARE THE USES OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!