1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
galben [10]
3 years ago
12

What is the code i need to do

Computers and Technology
1 answer:
Greeley [361]3 years ago
3 0
What section is it? I did the same thing a bit ago on edhesive
You might be interested in
What is the value of the variable result after these lines of code are executed?
notsponge [240]

Answer:

5

Explanation:

6 0
3 years ago
Read 2 more answers
Which process is a feature of webmail?
GalinKa [24]
Your mail gets sent across the internet to the other person you mailed to.
7 0
3 years ago
What is the number 5280 in binary
Tpy6a [65]
0001010010100000?
Hopefully I'm right
7 0
3 years ago
Recall that two strings u and v are ANAGRAMS if the letters of one can be rearranged to form the other, or, equivalently, if the
never [62]

Answer:

See explaination

Explanation:

Kleene's Theorem states that, in fact, these classes are the same: every regular language may be recognized by some FA, and every FA language may be represented using a regular expression.

Kindly check attachment for the step by step solution of the given problem.

5 0
4 years ago
Complete the steps to evaluate the following
kirill115 [55]

Answer:

log base 3a= -0.631.log a/3 base 3

Now, -log m= log 1/m

hence,

log base 3a= 0.631.log 3/a base 3

log base 3a/log 3/a base 3 =0.631

log base 3 ( a.3/a) =.631 since, log m/logn =log n(m)

log base 3 3=0.631

Hence, answer is log base 3 3=0.631

Explanation:

Please check the answer section.

3 0
3 years ago
Read 2 more answers
Other questions:
  • Jessica has pinned her favorite applications as icons on her desktop. She always clicks on these icons to work on them. Which us
    10·1 answer
  • Which command would you use to move a file from one location to another?
    6·2 answers
  • When reading data across the network (i.e. from a URL) in Python 3, what method must be used to convert it to the internal forma
    9·1 answer
  • After saving her presentation initially, Leah realizes she needs to add another content slide. She adds the slide and is ready t
    7·1 answer
  • COMPUTER FUNDIMENTAL HELP 15 POINTS!! RESEND IT
    7·2 answers
  • FOR 15 POINTS AND BRAINLIEST!<br> What are the possible consequences of Invasion of privacy?
    8·1 answer
  • What are folders within folders called​
    8·2 answers
  • Jason has decided to use his name on all the images to protect them from misuse. He has also decided to use the logo of his comp
    15·2 answers
  • An entity can be said to have __ when it can be wronged or has feelings of some sort
    10·1 answer
  • You are given the following design parameters, fill in the table: All memory addresses are 32-bit long; A 64Kbyte (2^16 byte) ca
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!