1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NikAS [45]
3 years ago
14

SOMEBODY HELP ME ASAP PLEASE AND THANK YOU

Computers and Technology
2 answers:
Paha777 [63]3 years ago
7 0

Answer:

Isnt there another thing that is supposed to be there like some website

Explanation:

g100num [7]3 years ago
7 0
I think something else is supposed to be there but I don’t get it
You might be interested in
Computers heat resistant materials breathing systems for fire fighters food-growing technologies improvements in all of the item
Scorpion4ik [409]
<span>Computers heat resistant materials breathing systems for fire fighters food-growing technologies improvements in all of the items in this list were first made possible by :  a.space exploration.</span>
4 0
3 years ago
Which of the following is not true about primitive data types.
SVEN [57.7K]

Answer:

The point 2 is incorrect as Primiticve data types are immutable

Explanation:

3 0
3 years ago
when web services are offered outside the firewall, traffic is prevented from reaching the internal networks via the implementat
Tju [1.3M]

An isolated networking space or sub-network that is isolated from the rest of the organization's connected footprint using logical or physical blocks to enable access to untrusted connections in a safe environment is referred to as a demilitarized zone (DMZ).

Demilitarized zones are secluded network areas that provide as a secure link between proprietary and non-proprietary networks within an organization's perimeter. It stops unauthorized traffic from entering the internal local area network of a business. A demilitarized zone (DMZ) is a region where warring parties have agreed to put their differences aside in order to create peace. An example of a DMZ is the little sliver of territory that divides North and South Korea on the Korean Peninsula.

Learn more about demilitarized here-

brainly.com/question/7933837

#SPJ4

3 0
1 year ago
Programming: Write a recursive function to_number that forms the integer sum of all digit characters in a string. For example, t
scZoUnD [109]

yes

Explanation:

isn't really noted but if the sequence is in the given order the ("3at4") could be expressed in a ('0' to '9' )format

7 0
3 years ago
Many documents use a specific format for a person's name. Write a program whose input is: firstName middleName lastName, and who
never [62]

Answer:

Python Program:

if __name__ == '__main__':

   a = input("Enter Name: ")

   b = a.split()

   print(b[2] + ',' , b[0], b[1][0])

Explanation:

The input function will be used to prompt user to enter the name of the person. The person's name will be stored in variable a.

Let us assume that the user entered a name mentioned in the example, which is Pat Silly Doe, Now variable a = 'Pat Silly Doe'.

The function a.split() is used to split a string into a list. The splitting (by default) is done on the basis of white-space character. Therefore, a.split() will give a list

['Pat', 'Silly', 'Doe']

which will be later on stored in variable b.

We can use the subscript operator [] to access the values in a list. Suppose if we have a list a, then a[i] will give us ith element of a, if i < length of a.

Finally, we print the answer. b[2] will give us the last name of the person. We append a comma using '+' operator. b[0] will give us the first name. b[1] will give us the middle name, but since we only need one character from the middle name, we can use another subscript operator b[1][0] to give us the first character  of the middle name.

Note: Characters of strings can be accessed using subscript operator too.

4 0
4 years ago
Other questions:
  • . Alex discovered a bunch of SATA drives in a box at the office and needs to check the contents. What can he do so that Windows
    13·1 answer
  • เเปลภาษานิราศภูเขาทอง
    10·1 answer
  • Which name is given to a set of communications standards for simultaneous digital transmission of voice, video, data, and other
    6·1 answer
  • Write a calculator program that keep reading operations and double numbers from user, and print the result based on the chosen o
    6·1 answer
  • What is the program that searches through data bases?
    10·1 answer
  • A security utility program that scans the system for small programs that interfere with how a computer functions are _____ utili
    13·1 answer
  • What does this mean in python?
    5·1 answer
  • Who can help me on my school we will to google meet and i share my screen
    5·1 answer
  • Alison is having a hard time at work because her Inbox is flooded with emails every day. Some of these emails are unsolicited. S
    15·2 answers
  • A location in space is called?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!