1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Citrus2011 [14]
3 years ago
8

Sendddd meeeee memessss plsssssss

Computers and Technology
2 answers:
Nuetrik [128]3 years ago
7 0

Answer:

hey blake!!

Explanation:

there ya go

marishachu [46]3 years ago
4 0

Answer:

Hi it's OnePunchFan, i got banned and you prb dont

know me

You might be interested in
What is the fundamental purpose of sentiment analysis on social media?​
Rzqust [24]

Answer:

A social media sentiment analysis tells you how people feel about your brand online. Rather than a simple count of mentions or comments, sentiment analysis considers emotions and opinions. It involves collecting and analyzing information in the posts people share about your brand on social media.

Explanation:

8 0
3 years ago
A network admin configures a static route on the edge router of a network to assign a gateway of last resort (the router that co
kupik [55]

Answer:

Use the default-information originate command.

Explanation:

A network administrator customizes a fixed path on a channel's edge router for creating any last recourse gateway that is the router connecting to the online / ISP. So, they using the usual command source to customize the edge router to connect this path instantly using RIP.

That's why the following answer is correct according to the scenario.

8 0
3 years ago
Tasks on a checklist should be written in as general terms as possible so that developers and artists have enough creative freed
GrogVix [38]

Answer:  True

Explanation: Developers who design always take on idea that was created and add to it. Creating a piece of artwork/ Item.

7 0
2 years ago
Read 2 more answers
What output will the look up formula below produce in relation to the following table?
noname [10]

Answer:

The VLookup checks a value inside a table through matching over the 1st column.

Lookup a value in a table by matching on the first column and the matched value is returned from the table.

Explanation:

The formula for the VLOOKUP is

=VLOOKUP (value to be matched in the first column, table from which the value will be looked for, col_index is the column inside the table from where the value is fetched, [range_lookup] is true for the approximate match, and false for exact match)

5 0
3 years ago
Write a program that computes the minimum, maximum, average, median and standard deviation of the population over time for a bor
rodikova [14]

Answer:

import pandas as pd

df = pd.read_csv('nycHistPop_csv', skiprows=5)

NY_region = list(df.columns[1: -1])

select_region = input("Enter region: ")_capitalize()

if select_region in NY_region:

   pass

else:

   raise("Region must be in New york")

def pop(location):

   # or used describe() to replace all like: print(df[location]_describe())

   print(df[location]_min())

   print(df[location]_max())

   print(df[location]_mean())

   print(df[location]_median())

   print(df[location]_td())

pop(select_region)

Explanation:

Pandas is a python packet that combines the power of numpy and matplotlib used for data manipulation. It is good for working with tables that are converted to dataframes.

The nycHistPop_csv file is read to the code to a dataframe called "df", then the user input and the function "pop" is used to automatically generate the statistics of a given region.

4 0
3 years ago
Other questions:
  • By default, which of these traffic source dimensions does google analytics capture for each user that visits your website?
    8·1 answer
  • an object or device outside the computer, that one would plug into a port to control the functions of a computer are?
    9·2 answers
  • For a class project, Jerome builds a simple circuit with a battery and three light bulbs. On his way to school, Jerome drops his
    9·1 answer
  • You can't get close enough to the facility interior to launch an evil twin attack against its wireless clients; in fact, you hav
    11·1 answer
  • What is an advantage of a computer network ? networked
    13·2 answers
  • Name TanushSAVAGE. As given in the picture, Subscribe!
    15·1 answer
  • The advancement of technology in our daily lives has changed how we interact with the world.
    10·1 answer
  • What are two different ways by which a laptop could utilize the cellular network connection of a mobile device
    15·1 answer
  • Paisa pay is facilitated in which e commerce website​
    15·1 answer
  • What does the % find
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!