1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mnenie [13.5K]
3 years ago
5

Which bug type would you suggest for the following bug? The button label "Add to cart" is not fully visible.

Computers and Technology
1 answer:
harina [27]3 years ago
3 0
Butterfly one I forgot the name metapods evolution
You might be interested in
HELP ASAP
Tju [1.3M]

Answer: B. Personal Idea

Explanation:

Issac Newton's Law of Gravity was made by the one and only, Issac Newton.

He used his time to investigate and discover this law, so choice one, cheating is not correct. Choice three is also incorrect, because the world didn't know about this law, or so much about gravity during that time.

Thus, choice two is correct because it was created and written through his ideas.

So therefore, the answer is choice two, personal idea.

Read more on Brainly.com - brainly.com/question/10659333#readmore

4 0
3 years ago
Provide your own examples of the following using Python lists. Create your own examples. Do not copy them from another source. N
leonid [27]

Lists are used in Python to hold multiple values in one variable

<u>(a) Nested list</u>

A nested list is simply a list of list; i.e. a list that contains another list.

It is also called a 2 dimensional list.

An example is:

nested_list = [[ 1, 2, 3, 4]  , [ 5, 6, 7]]

<u>(b) The “*” operator </u>

The "*" operator is used to calculate the product of numerical values.

An example is:

num1 = num2 * num3

<u>List slices </u>

This is used to get some parts of a list; it is done using the ":" sign

Take for instance, you want to get the elements from the 3rd to the 5th index of a list

An example is:

firstList = [1, 2 ,3, 4, 5, 6, 7]

secondList = firstList[2:5]

<u>The “+=” operator </u>

This is used to add and assign values to variables

An example is:

num1 = 5

num2 = 3

num2 += num1

<u>A list filter </u>

This is used to return some elements of a list based on certain condition called filter.

An example that prints the even elements of a list is:

firstList = [1, 2 ,3, 4, 5, 6, 7]

print(list(filter(lambda x: x % 2 == 0, firstList)))

<u>A valid but wrong list operation</u>

The following operation is to return a single list, but instead it returns as many lists as possible

def oneList(x, myList=[]):

   myList.append(x)

   print(myList)

oneList(3)

oneList(4)

Read more about Python lists at:

brainly.com/question/16397886

6 0
2 years ago
Which statement is true? Select 3 options.
irina1246 [14]

Answer:

The statements which are true are;

  • A user-defined data type can include other user-defined data types
  • A user-defined data type is defined using a class
  • A user-defined data type can include a list

Explanation:

A user-defined data type (UDT) is a datatype that is defined and derived by the use of the datatypes which preexist including existing user-defined datatypes and the built-in datatypes

It is therefore true that a user-defined data type can include other user-defined data types

A class is a user-defined data type that contains both its member data and member functions, that can be used when an instance of the class is first created

Therefore, a user-defined data type is defined using a class

In a user-defined data type, a variable has actual data within it which can include an array or list

Therefore a user-defined data type can include a list.

3 0
2 years ago
Read 2 more answers
An information system includes _____, which are programs that handle the input, manage the processing logic, and provide the req
Ronch [10]

Answer:

applications

Explanation:

In an information system, applications or software are indispensable. This is because the entire data/info processing pipeline running on daily basis have been digitized. Users are heavily rely on the applications to gain and store new data, to manage and process the data and to deliver the necessary output. The applications enable the entire data processing work become more efficient, systematic and also more secure.

7 0
3 years ago
When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________
tresset_1 [31]
The answer is Phishing
3 0
3 years ago
Read 2 more answers
Other questions:
  • What is the opening page of a website called?
    9·2 answers
  • "write a program that reads two floating point numbers and prints their sum difference and product."
    13·1 answer
  • When shooting in a windy outdoor environment a ___should be placed over the mic
    7·1 answer
  • Data hiding, which means that critical data stored inside the object is protected from code outside the object, is accomplished
    14·2 answers
  • If you have a long title for a table and need it to span several cells, you can use A. Merge Cells. B. Split Cells. C. Insert Co
    5·1 answer
  • g What advantage does a circuit-switched network have over a packet-switched network? What advantages does TDM have over FDM in
    10·2 answers
  • Which criteria can cuboids/frame selectors be coloured by​
    15·1 answer
  • The software that displays the resulting web pages is​
    9·1 answer
  • நெறி என்னும் சொல்லின் பொருள்___ *​
    14·1 answer
  • 9.19 LAB: Words in a range (lists) Write a program that first reads in the name of an input file, followed by two strings repres
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!