1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sloan [31]
3 years ago
6

Social networking sites like Office Online, PayPal, and Dropbox are used to develop social and business contacts.

Computers and Technology
2 answers:
Vadim26 [7]3 years ago
5 0
False. Those are not social networking sites, and they don't develop contracts.
sergejj [24]3 years ago
3 0

Answer:

False

Explanation:

You might be interested in
I need help RIGHT NOW!!!!!!!!!!!!!!!!
Semenov [28]
Professionals use computers for many things, for example, to store their information. It might be hard to keep up or to find the information they need when printed on paper. So they just copy the information and put it into their computers, where they can just type in a keyword and then they quickly the information they need.

Hope This Helps!
4 0
3 years ago
Write a function called getChar that has no function inputs, but takes in two character inputs from the user (in1 and in2) and o
bearhunter [10]

Answer:

def getChar():

   while True:

       in1 = input('Enter first char: ')

       try:

           if len(in1) != 1:

               raise

           else:

               in2 = input('Enter second char: ')

               if len(in2) != 1:

                   raise

               else:

                   break

       except:

           print('Enter just one character')

   return in1, in2

def chars2string(in1,in2):

   print(in1*5 + in2*5)

def main():

   ls = getChar()

   in1 = ls[0]

   in2 = ls[1]

   chars2string(in1, in2)

if __name__ == '__main__':

   main()

Explanation:

The programming language used is python 3.

The script first defines a function getChar and makes use of a while loop in combination with try and except blocks and IF statements, the code ensures that both inputs that are entered by the user after the prompt are 1 in length. i.e. Just one character. This function returns the two characters that were entered.

The second function that is defined is chars2string this function takes two arguments, It repeats each argument five times and returns a joined string.

Finally, the main function is defined and it calls the getChar function  first, the values that are returned by this function is assigned to two variables, that is then passed on to the chars2string function. The main function is called and the Joined string is printed to the screen.

3 0
3 years ago
Sing hard disk space to temporarily store data or instructions from ram is referred to as the?
Alecsey [184]

Using hard disk space to temporarily store data or instructions from RAM is referred to as <u>virtual memory</u>.

In the field of computers, virtual memory can be described as a method for managing the memory of a system and enabling more space for physical memory. Virtual memory has the advantage of freeing up space so that a shared memory does not need to be used.

Virtual memory causes the stored data in a system to be temporarily get stored in the disk storage from the random access memory (RAM).

The process of virtual memory makes secondary memory seem like a part of the main memory of a system. The amount of storage that can be done by the virtual memory depends on the storage capacity of the secondary memory of a system.

To learn more about virtual memory, click here:

brainly.com/question/13088640

#SPJ4

7 0
2 years ago
Many documents use a specific format for a person's name. Write a program whose input is: firstName middleName lastName, and who
never [62]

Answer:

Python Program:

if __name__ == '__main__':

   a = input("Enter Name: ")

   b = a.split()

   print(b[2] + ',' , b[0], b[1][0])

Explanation:

The input function will be used to prompt user to enter the name of the person. The person's name will be stored in variable a.

Let us assume that the user entered a name mentioned in the example, which is Pat Silly Doe, Now variable a = 'Pat Silly Doe'.

The function a.split() is used to split a string into a list. The splitting (by default) is done on the basis of white-space character. Therefore, a.split() will give a list

['Pat', 'Silly', 'Doe']

which will be later on stored in variable b.

We can use the subscript operator [] to access the values in a list. Suppose if we have a list a, then a[i] will give us ith element of a, if i < length of a.

Finally, we print the answer. b[2] will give us the last name of the person. We append a comma using '+' operator. b[0] will give us the first name. b[1] will give us the middle name, but since we only need one character from the middle name, we can use another subscript operator b[1][0] to give us the first character  of the middle name.

Note: Characters of strings can be accessed using subscript operator too.

4 0
4 years ago
HURRY
Irina-Kira [14]

<em>Your answer is B: cooperative player-to-player interaction</em>

<em></em>

<em></em>

<em />

6 0
4 years ago
Other questions:
  • Suppose you wish to write a method that returns the sum of the elements in partially filled array. Which is the best choice for
    6·1 answer
  • A quick boot allows you to do what?
    7·2 answers
  • Research information technology affects on job market, career pathways, occupational outlooks in business and finance and synthe
    7·1 answer
  • Describe the GRANT statement and explain how it relates to security. What types of privileges may be granted? How are they revok
    15·1 answer
  • Megahertz is a measurement of
    13·1 answer
  • Write a program that reads a list of integers, and outputs those integers in reverse. The input begins with an integer indicatin
    6·1 answer
  • Define a function in Scheme (or relation in Prolog) that checks whether a set of elements (represented as a list) is a subset of
    10·1 answer
  • Which of the following describes a characteristic of organic light-emitting diodes (OLEDs) used in clothing?
    6·2 answers
  • How do spear phishing attacks differ from standard phishing attacks?
    5·1 answer
  • PLEASE ANSWER IN COMPLETE SENTENCES - JOURNALISM, 30 POINTS
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!