1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
HACTEHA [7]
3 years ago
11

You already know how to use lists. What is the index of 5 in the following list? [2, 3, 5, 1, 6]

Computers and Technology
2 answers:
Debora [2.8K]3 years ago
7 0

Answer:

it's 2

Explanation:

it goes 0, 1, 2.

ASHA 777 [7]3 years ago
5 0

Answer:

1

Explanation:

You might be interested in
The best defenses against covert channels include IDS and intrusion prevention system (IPS) and thoroughly watching all aspects
ddd [48]

Answer:

The statement is True

Explanation:

When talking about computer security, we can define covert channels as an attack on a system capable of creating a loophole for information objects transfer between various processes that would normally not allow communication under the computer security policy. Hence, the best defenses system against this kind of attack is via Intrusion Defense System and Intrusion Prevention System and relentlessly "watching all aspects of an IT infrastructure for aberrant or abnormal events of any type."

7 0
3 years ago
You must have an active ____ to test external links.
charle [14.2K]
Network & internet connection
4 0
4 years ago
There are 4 classrooms for fifth grade and 4 classrooms for sixth grade at a school. Each classroom has 20 students. A teacher i
olga_2 [115]

Answer:

what do you want

Explanation:

there are 160 people in all if thatś what you want

5 0
3 years ago
Read 2 more answers
A nurse is reviewing the different cloud office applications available. When comparing the iCloud to other cloud office applicat
hoa [83]

Answer:

A nurse should have to consider a

  • web browser to access the app
  • the app is not a downloadable type

Reasons have explained in the explanation.

Explanation:

All apps can find a copy of the phone's web browser in the app drawer. Google Chrome is the name of Google's browser that can use for reviewing the different cloud applications.

A Web application is  stored on the server and over the internet through an interface.

She should have to use these features.

8 0
3 years ago
About computer in manufacturing​
Karolina [17]


Computer-integrated manufacturing is the manufacturing approach of using computers to control the entire production process


7 0
3 years ago
Other questions:
  • Create a test that prompts a user to enter a 5-digit PIN in the main procedure and then calls Validate PIN procedure to validate
    12·1 answer
  • When the system denies access to someone who is authorized it is called a - false negative?
    13·1 answer
  • Technician A says that if a valve is open when a piston rises to the very top of a cylinder, the piston may actually strike the
    13·1 answer
  • In addition to talking to other doctors remotely, telegraphy technology?
    5·1 answer
  • EASY QUESTIONS! 10 POINTS AND BRAINLIEST FOR BEST ANSWER! PLEASE HELP ANSWER THIS only if you know BOTH ANSWERS!
    6·2 answers
  • . Which one of the following is not a JAD participant? 1. Managers 2. System analyst 3. Business development manager 4. Users
    7·1 answer
  • To make slides in a PowerPoint Online application presentation have the same transition effect, select __________ on the Transit
    11·2 answers
  • Consider the code block below. What is the value of amount when this method is called twice, the first time using cookieJar(7) a
    9·1 answer
  • What do other people think of e.t <br> in the movie E.T
    5·1 answer
  • Monica is writing a paper, and it needs to contain a certain amount of words. What Word Online feature can she use?IndentingProo
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!