1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Misha Larkins [42]
3 years ago
13

# 12/9/2020

Computers and Technology
1 answer:
EastWind [94]3 years ago
3 0

where it says   " def main() " there needs to be something in the "()"

Hope this helps.   : )

You might be interested in
Which of the following devices are least likely to deny a connection inline when an attack is detected? (select 2)
user100 [1]

Answer: Option (A) & (D) are correct.

Layer 2 switch is commonly referred to as a type of network or device switch that tends to work on data link layer and use MAC addresses in order to determine the route through which the frames are forwarded.

An IDS known as intrusion detection system is commonly referred to as a device or application that controls a network for malevolent activity and its policy violations.

7 0
3 years ago
What is better for the sd card use as portable storage or use as internal storage?
Sever21 [200]
It depends on what you’d need it for.

> Portable Storage <
- Good for traveling.
- Good for porting stuff from a device to another device.

> Internal Storage <
- Better if you are using it for one device.
- Increase device storage.
5 0
3 years ago
Lael Masterson works in the Student Activities Office at Valerian State College in Illinois. Lael has started compiling informat
Nina [5.8K]

Answer:

Use the HLOOKUP function in the cell E2 by specifying the student's hourly rate value, the range of cells of the table holding the information, the row from which to return the value, and a value of true or false for approximate or exact match respectively.

Explanation:

Microsoft Excel is a statistics tool used for data analysis. It has several functions and graphical properties for cleaning and representing data.

The HLOOKUP function is an example of a search function in excel, it returns a value based on another value from a range of cells. The function accepts four arguments, they are, the value to be searched, the range table or cell range to search, the row to get the search value, and a mode of return value to return, could be either true for an approximate match or false for an exact match.

6 0
3 years ago
When mysql automatically converts one data type to another, itâs known as a/an ______________________ conversion?
lubasha [3.4K]
<span>MySQL is an open-source relational database management system (RDBMS)</span>
When MySQL automatically converts one data type to another, is known as an implicit conversion. Implicit conversion refers to the mixing and matching data types within the same operation. Example for implicit conversion is when MySQL automatically converts numbers to strings and vice versa. 
5 0
3 years ago
¿como la imagen organiza la realidad?
Troyanec [42]

Answer:

Las imágenes son las percepciones visuales que las personas tienen respecto de la realidad que los rodea. Así, a través de la visión, las personas pueden interpretar el contexto en el cual se encuentran inmersos, organizando los distintos componentes de la realidad en la cual desarrollan sus vidas, para poder comprender entonces de qué modo proceder ante las diferentes eventualidades de la vida.

Es decir que, a través de las imágenes, y en conjunto con las demás percepciones sensoriales, los seres humanos pueden contextualizarse en un entorno en el cual se desenvuelven, organizando su vida y su realidad a futuro.

7 0
2 years ago
Other questions:
  • _____ includes a wide range of applications, practices, and technologies for the extraction, transformation, integration, analys
    9·1 answer
  • Which of the following Google tools support collaboration? Docs Sheets Slides All of the Above
    13·1 answer
  • 2) Search the Web for two or more sites that discuss the ongoing responsibilities of the security manager. What other components
    15·1 answer
  • HURRY!!!!!!!!!!!!!
    15·1 answer
  • In Windows, which menu allows you to view file characteristics?
    14·1 answer
  • If someone wanted to talk to a financial institution representative in person they would need to _____.
    5·1 answer
  • What are spreadsheets in a excel workbook called? A. pages B. notepads C.graphs D.worksheets
    10·1 answer
  • Compare and contrast two fundamental security design principles in network security. Analyze how these principles and how they i
    15·1 answer
  • 1. How many bits would you need to address a 2M × 32 memory if:
    8·1 answer
  • Activity 1.1.4 What is Technology?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!