1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Monica [59]
3 years ago
9

True/False: On the piano, middle C is located to the left of the 2 black keys in the middle.

Computers and Technology
2 answers:
Delicious77 [7]3 years ago
8 0

Answer:true

Explanation:

docker41 [41]3 years ago
5 0

Answer:

um true??

Explanation:

You might be interested in
Computers and other technologies perform a great deal of work today, reducing the need for workers with special expertise. As a
Veronika [31]

Answer: deskilling

Explanation: Deskilling is the process by which skilled labor within an industry or economy is abolished by the introduction of technologies operated by semi skilled or unskilled labourers .

5 0
3 years ago
The function below takes a string argument sentence. Complete the function to return the second word of the sentence. You can as
Soloha48 [4]

Answer:

Following are the program in the Python Programming Language.

# define function.

def return_second_word(sentence):

 #remove all the spaces from the sentence

 sentence=' '.join(sentence.split())

 #the list is split from spaces

 my_list = sentence.split(" ")

 #return the list

 return my_list[1]

#define main function

def main():

 #get input from the user

 se = input("Enter the sentence: ")

 #print and call the function

 print(return_second_word(se))

#condition to execute the main function

if __name__ == "__main__":

 #call main function

 main()

<u>Output:</u>

Enter the sentence: I love python

love

Explanation:

Here, we define the function i.e., "return_second_word()" and pass an argument "sentence", inside the function.

  • Remove all the spaces from the variable "sentence" and again store in the variable "sentence".
  • Set the variable "my_list" that store the split value of the variable "sentence".
  • Return the list and close the function.

Finally, we define the main function and inside the main function.

  • Get input from the user in the variable "se"
  • And pass the variable "se" in the argument list during the calling of the function "return_second_word()".
  • Then, print and call the function "return_second_word()".
  • Set the if statement to call the main function then, call the main function.
4 0
3 years ago
An engineer learns a new security threat mitigation technique. The technique maps an IP address to a non-existent host, and is u
xenn [34]
A. In network architecture, a black hole drops traffic before it reaches its intended destination, and without alerting the source. A simple example is traffic sent to an IP address that an admin mapped to a non-existent host.
B. A sinkhole is similar to configuring a black hole, and often used interchangeably. With sinkholing however, an admin usually retains some ability to analyze and forward the captured traffic.
5 0
3 years ago
Which statement best describes the pros and cons of lack of regulation for cloud-based technology? Lack of regulation enables pe
Vitek1552 [10]

Answer:

3.) Lack of regulation encourages open innovation, but is not always secure.

Explanation:

Got it right in Introduction to Careers in Arts, A/V Technology and Communications

4 0
3 years ago
Computer design software requires _____ to be used properly and successfully by architects.
Tju [1.3M]
A I hope it helps you out
5 0
3 years ago
Read 2 more answers
Other questions:
  • 4. When inserting clip art into a page of text, which of the following is true? (1 point)
    14·2 answers
  • Client/server awareness. Visit three local stores in your neighborhood or mall and notice the information technology in the stor
    9·2 answers
  • When using social​ media, make sure to provide access to all the information needed to accurately process messages by following
    6·1 answer
  • Nonverbal messages from the movie it​
    5·2 answers
  • List and briefly describe passive and active security attacks.
    10·1 answer
  • Point out the wrong statement:
    7·1 answer
  • Can you please help me
    9·1 answer
  • Can someone pls do a toradora,Mha or princess jellyfish rp I'm open for anyother rp's
    11·2 answers
  • SOMEONE HELP ME!!!!!
    8·1 answer
  • onsider a file system on a disk that has both logical and physical block sizes of 512 bytes. assume that the information about e
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!