1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
drek231 [11]
3 years ago
6

Which term describes how content in an array is accessed?

Computers and Technology
1 answer:
Soloha48 [4]3 years ago
7 0

Answer:

the answer is subscript

Explanation:

You might be interested in
An alteration threat violates information integrity. <br> a. True <br> b. False
Art [367]
The answer is True


It intentionally or unintentionally compromises a system by making unauthorized changes to data. As compared to intentional changes which are usually malicious, unintentional changes are normally accidental. Changes and modifications to the system configurations can also compromise integrity. Such modifications might include deleting, changing, and creating information in a network resource. It is best to implement mechanisms on how one can track and audit such changes as they happen




6 0
3 years ago
What was the attitude of the U.S. Senate towards the Treaty of Versailles, and why did they have that attitude?​
Arte-miy333 [17]

Answer:

in 1919 the Senate rejected the Treaty of Versailles, which formally ended World War I, in part because President Woodrow Wilson had failed to take senators' objections to the agreement into consideration. They have made the French treaty subject to the authority of the League, which is not to be tolerated. hope it helps in someway ig idk

Explanation:

8 0
3 years ago
How can you solve real world mathematical problems using two linear equations in two variables​
ipn [44]

Answer:

import numpy as np

a = int(input ("Enter a"))

b = int(input ("Enter b"))

c = int(input ("Enter c"))

d = int(input ("Enter d"))

c1 = int(input ("Enter c1"))

c2 = int(input ("Enter c2"))

array1 =[[a, b],[c, d]]

A = np.array (array1)

B = np.array ([c1, c2])

X = np.linalg.inv (A).dot (B)

print (X)

Explanation:

let ax + by =c1

     cx + dy =c2

We have used the above NumPy library that has the methods for matrix calculation, and here we have used matrix multiplication, and the inverse of a matrix to find the value of x and y.

We know AX=B

X = inv A. B

And this we have used above. We can calculate inv A and do matrix multiplication using NumPy. And thus we get the above solution.

3 0
3 years ago
Which of the following is a quick way to restore the arrow pointer after you have used it for drawing?
Oxana [17]
A quick way to restore the arrow pointer after you have used it for drawing is to press the esc key.  The esc key is <span>used for any of the different </span>functions<span>, as to interrupt or cancel the current process or running program, or to close a pop-up window.</span>
7 0
3 years ago
1.Discuss why this class is important (or not) to a soon-to-be security practitioner. 2.Discuss one of more subjects you have le
KIM [24]

Answer:

I just can't make out the question

8 0
3 years ago
Other questions:
  • Help me Please?!! I will put you as brainliest.<br>I hope I spelled that right.
    5·2 answers
  • Var cookie = "username=mike2009";
    10·1 answer
  • What is the full path of the directory on this computer containing the SAM registry hive file
    15·1 answer
  • Virtual private network requires a secure remote connections<br><br> true or false?
    11·1 answer
  • The position of a _____ is a nontechnical position responsible for defining and implementing consistent principles for setting d
    15·1 answer
  • Human factors is the study of:
    5·1 answer
  • David Doe is a network administrator for the ABC Company. David is passed over for promotion three times. He is quite vocal in h
    14·1 answer
  • Which search engine does not track users? Choose the answer.
    10·2 answers
  • Tick the best alternatives 1. Which one of the following is input device? a) Speaker b) Printer c. Monitor d. Mouse​
    8·2 answers
  • Matt uploads a malware sample to a third-party malware scanning site that uses multiple antimalware and antivirus engines to sca
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!