1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
krok68 [10]
3 years ago
10

How to write a program to draw 1000 random points on a frame in python language for coding?

Computers and Technology
1 answer:
ioda3 years ago
6 0

Answer: it

Explanation: you should it

You might be interested in
What are the 5 general terms of the fair use rule
Andrews [41]

the purpose and character of your use.

the nature of the copyrighted work.

the amount and substantiality of the portion taken, and.

the effect of the use upon the potential market

In its most general sense, a fair use is any copying of copyrighted material done for a limited and “transformative” purpose, such as to comment upon, criticize, or parody a copyrighted work. Such uses can be done without permission from the copyright owner

the nature of the copyrighted work; the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and. the effect of the use upon the potential market for or value of the copyrighted work

uwu hope dis halpz!

5 0
3 years ago
How would you define a relational database ?
UNO [17]

Answer: (D) Database design follows the twelve principles proffered by Dr. Edgar F. Codd

Explanation:

 The relational database is basically based on the relational model of the data which is proposed by the Dr Edger F. codd and he mainly introduced the twelve basics principle of the database designing in the database system. He also contributed various valuable principle in the computer science.

The twelve principle are:

  • The first rule of the relational database is the information rule as it represented all data or information
  • Independence of the integrity
  • Viewing various updating rule
  • Logically treatment of various NULL value
  • Independence of the physical database
  • Distribution in-dependency
  • Various delete, insert and update rules
  • The overall logical description of the database are basically stored in the database directory
  • There is no subversion rule
  • There is guarantee accessing rule
  • Proper rule for data language
  • The relational database level actions

7 0
3 years ago
1. Write a statement that opens the file Customers.dat as a random access file for both reading and writing.
KengaRu [80]

Answer:

Explanation:

In Python you need to give access to a file by opening it. You can do it by using the open() function. Open returns a file object, which has methods and attributes for getting information about and manipulating the opened file.

https://eecs.wsu.edu/~cs150/tutorial/file/code11_3.html

Look at this link it may help.

3 0
3 years ago
Claire is a manager at an information technology (IT) firm. She notices a consistent drop in the productivity of her employees.
Karolina [17]
D identifying decision criteria
3 0
3 years ago
What is the default zoom percentage in Word?<br><br> 50%<br> 100%<br> 150%<br> 200%
Hunter-Best [27]

Answer:

its 100%

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • We may think of relationships in the E/R model as having keys, just as entity sets do. Let R be a relationship among the entity
    14·1 answer
  • The process that uses 3D modeling software to create a representation of a three dimensional object is called 3D modeling.
    15·2 answers
  • Write the definition of a function named rotate4ints that is passed four int variables. The function returns nothing but rotates
    9·1 answer
  • To what type of user does he most likely have access? Jae is using a computer at the public library to do research she's able to
    9·1 answer
  • Can someone tell me how to use the Human machine language for beginners? or websites I should use.​
    7·1 answer
  • What port is typically reserved and utilized by the Secure Hypertext Transfer Protocol to create a secure connection to a Web se
    13·1 answer
  • Which of these best represents a call to action?
    7·2 answers
  • Algorithm to calculate the sum and difference of 15 and 12​
    9·1 answer
  • Which Internet protocol (IP) packet fragmentation header field specifies where the fragment belongs in the original datagram
    6·1 answer
  • if you are using an administrator account during a software installation and you get prompted by the uac, you should
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!