1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
worty [1.4K]
3 years ago
8

thick is incorrect does anybody know the correct answer? please don’t send any files i can’t open them

Computers and Technology
1 answer:
77julia77 [94]3 years ago
7 0

Answer:

i think its new

Explanation:

if this is incorrect i apologize

You might be interested in
From the standpoint of the governing bodies of .com, why is it important that owners of individual domains maintain authoritativ
mixer [17]

Answer:

Explanation:

A subdomain is really important on the internet, we can categorize our blog, e-commerce or simple informative website, for example, if we want to have a blog and e.commerce of the same topic, we can have a subdomain for each website, if we separate our website, and we administrate our content is a good signal for SEO, we could have more promotion in search engine.

4 0
3 years ago
__________is threatening to steal or actually stealing information from a company and then demanding payment to not use or relea
Ludmilka [50]

Answer: 3) Information extortion

Explanation:

Information extortion is defined as the technique through which a person tends to steal and hold the confidential and important information with theirself and then demand ransom for returning it.

  • Releasing information to corrupt and attacking sources can be a consequence if the demand or condition is not fulfilled by the authorized party or person.
  • Other options are incorrect because espionage is spying military information.Competitive intelligence is used for managing strategic plans.Intellectual property is created through mind power.
  • Thus, the correct option is option(3).
5 0
3 years ago
fill down feature on a formula and you need to keep a cell reference the same which one will allow you to keep the same cell ref
dedylja [7]
A dollar sign after both the letter and the number for each cell reference you want to keep the same will keep it the same when using the fill down/across function.
6 0
3 years ago
Why do businesses often provide a logo on their web pages?
Nitella [24]
<span>B. They provide viewers with a consistent visual reminder of their company.

This is a prevalent example of branding.</span>
7 0
3 years ago
The purpose of this assignment is to determine a set of test cases knowing only the function’s specifications, reported hereaf
Nesterboy [21]

Answer:

The program is written using PYTHON SCRIPT below;

N=int(input(" Enter number of Rows you want:"))

M=[] # this for storing the matrix

for i in range(N):

l=list(map(int,input("Enter the "+str(i+1)+" Row :").split()))

M.append(l)

print("The 2D Matrix is:\n")

for i in range(N):

print(end="\t")

print(M[i])

W=[] # to store the first non zero elemnt index

T=[] # to store that value is positive or negative

L=len(M[0])

for i in range(N):

for j in range(L):

if (M[i][j]==0):

continue

else:

W.append(j) # If the value is non zero append that postion to position list(W)

if(M[i][j]>0): #For checking it is positive or negative

T.append(+1)

else:

T.append(-1)

break

print()

print("The first Non Zero element List [W] : ",end="")

print(W)

print("Positive or Negative List [T] : ",end="")

print(T)

Explanation:

In order for the program to determine a set of test cases it takes in input of 2D matrix in an N numbet of rows.

It goes ahead to program and find the column index of the first non-zero value for each row in the matrix A, and also determines if that non-zero value is positive or negative. The If - Else conditions are met accordingly in running the program.

5 0
3 years ago
Other questions:
  • When you compose a message, you want your audience to find the information it needs quickly and to understand what it finds. You
    11·1 answer
  • Which of the preventive strategies is described below: Violence often escalates. Behaviors like excessive complaing, hostility,
    10·1 answer
  • Ansel Adams education and special training
    14·1 answer
  • Method x1() has code that calls method x2(). Method x2() has the following header.
    7·1 answer
  • nside of your organization that checks how often client machines access it. If a client machine hasn't accessed the server in th
    6·1 answer
  • Next, go to the mw_tour.html file. Within the document head, create links to the mw_layout.css and mw_styles.css style sheet fil
    10·1 answer
  • Name a piece of software you often use where it is easy to produce an error. Explain ways you could improve the interface to bet
    5·1 answer
  • What is the lowest layer of the OSI model at which LANs and WANs support the same protocols?
    5·1 answer
  • How can injection attacks be prevented? Check all that apply
    6·2 answers
  • Which of the following is true about overloaded methods?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!