1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
azamat
2 years ago
10

What value will the color variable have after these lines of code run?

Computers and Technology
1 answer:
hoa [83]2 years ago
5 0

Answer:

red

Explanation:

color is set to red in the last line of being defined.

You might be interested in
Help please not trying to fail
deff fn [24]

Answer:

B. Everywhere CFCI is not

8 0
3 years ago
In three or four sentences, describe how a person buys and sells stock.
Aleksandr-060686 [28]
In order to buy stock, you must go and find a stock broker. You do not always need a broker, but it is more convenient to have one to manage your stock. It also makes your life in the market easier. The broker will manage your shares and you tell him when you want to buy or sell your stock.
4 0
2 years ago
Read 2 more answers
In addition to avoidance and adaptation, two other means of risk reduction available to managers are ________ and ________. A. q
MrRissso [65]

Answer:

(b). dependency and hedging.

Explanation:

In the management of risk, four common approaches for reducing risk are;

i. <em>Avoidance</em>: Especially if a risk involved in the management of a resource (or project) poses or presents a negative consequence, the best way to manage the risk simply avoid it by making sure it doesn't happen. This can be by cancelling a project or restructuring it.

ii. <em>Adaptation</em>: Another way of managing the risk associated with a resource (human or non-human resource) is to control the risk either by increasing resilience or reducing vulnerability. This is called adaptation.

iii. <em>Dependency: </em>This means accepting the risk since every project or business has inherently in it some risk associated. Dealing with it might be a way out especially knowing that there might be some experience to be gained in order to tackle similar situation in the future.

iv. <em>Hedging: </em>This means transferring the risk to some other business or organization. An example might be to get an insurance to manage this risk. In this case, the risk is transferred to the insurance company.

7 0
2 years ago
Read 2 more answers
West Point Bridge Designer | Does anyone know a way to make this bridge cost less?
e-lub [12.9K]
Make the zig zag part more spaced out
4 0
2 years ago
Jen's house contains the following devices:
poizon [28]

Answer:

Jen's laptop and her daughter's phone, because they are both connected to the router and turned on.

Explanation:

A network comprises of two or more interconnected devices such as computers, routers, switches, smartphones, tablets, etc. These interconnected devices avail users the ability to communicate and share documents with one another over the network.

Additionally, in order for a network to exist or be established, the devices must be turned (powered) on and interconnected either wirelessly or through a cable (wired) connection.

Hence, the computers which are currently networked are Jen's laptop and her daughter's phone, because they are both connected to the router and turned on. A smartphone is considered to be a computer because it receives data as an input and processes the input data into an output (information) that is useful to the end user.

6 0
2 years ago
Other questions:
  • Create a program that reads words.txt (link near top of our home page) in order to: determine the length of the longest word(s)
    14·1 answer
  • __________ has led to the belief that the Internet is "free".
    8·1 answer
  • For security reasons a network administrator needs to ensure that local computers cannot ping each other. which settings can acc
    5·1 answer
  • Question 5 (1 point)
    5·1 answer
  • How would you define the rule of thirds?
    11·1 answer
  • mr. Jones put the same amount of soil around each of the five plants he has six bags of soil how many bags of potting soil did m
    14·1 answer
  • Define a constructor as indicated. Sample output for below program:Year: 0, VIN: -1Year: 2009, VIN: 444555666// ===== Code from
    8·1 answer
  • Holly the Hacker has a list of 100,000 common passwords. She wants to use this list to break into UNIX-like systems that use a p
    14·1 answer
  • 75 pts. Conduct online research about 10 of the most famous and dangerous computer viruses that threatened computer networks aro
    13·1 answer
  • Why do we use the internet so much?​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!