1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vanyuwa [196]
2 years ago
5

Write a program to Test if mold is stored in the variable word.

Computers and Technology
1 answer:
Aloiza [94]2 years ago
7 0

word = whatever value you want.

if "mold" in word:

   print("Mold is in the variable word.")

else:

   print("Mold is not in the variable word.")

You might be interested in
You can leave out the ____ statements in a switch structure.
KATRIN_1 [288]
Break statements is the answer.
7 0
3 years ago
When creating a spreadsheet, there's no need to worry about design and how it will be organized; the program will take care of t
Rainbow [258]
False: a computer program do many things, but it can't read your mind. It doesn't know what kind of formatting you need for your spreadsheet. There are so many potential layouts of a spreadsheet, that the computer couldn't decide what to lay it out for you. Eventually the computer can see what you're trying to lay it out as and can help that way, but it needs to e started first. Having a uniform sheet that is well organized by you, is much easier to read than gobbledegook that has been spewed everywhere.

I hope this was helpful!
3 0
3 years ago
Read 2 more answers
Which of the following tasks could be implemented as a filter using only a constant amount of memory (e.g., a couple of int or d
Nesterboy [21]

Answer:

Print the sum of the squares of the n numbers

Print the percentage of numbers greater than the average of the n numbers

Print the median f n numbers

Explanation:

The computer programs have different configurations based on the assigned tasks. The constant amount of memory is used by the cache. This is the new technology in the computer software which consumes only small amount of memory and activates once the task is assigned to it.

4 0
3 years ago
Write the code for invoking a method named sendObject. There is one argument for this method which is of type Customer. Assume t
kodGreya [7K]

Answer:

sendObject(John_Doe);

Explanation:

The above code has been written in Java.

Since the calling class is the same that declares it, to invoke the method, simply call its name with its argument(s) in a pair parentheses. The name of the method is "sendObject" and its argument is a reference to an object of type Customer saved in a variable called "John_Doe". This can be written as follows:

sendObject(John_Doe);

Hope this helps!

3 0
3 years ago
For each policy statement, select the best control to ensure Ken 7 Windows Limited fulfills the stated requirements and also pro
elena-14-01-66 [18.8K]

Answer:

1. Option (a) is the correct answer. "Place a firewall between the Internet  and your Web server".

2.  Option (e) is the correct answer. "Require encryption for all traffic flowing into and out from the Ken 7 Windows environment".

3. Option (d) is the correct answer. "Implement Kerberos authentication for all internal servers".

4. The correct answer is option (g) "Require all personnel attend a lunch and learn session on updated network security policies".

5. Option (c) is the correct answer. "Enforce password complexity".

Explanation:

1. Users who tried to use ken 7 network resources for social media access will not be enable to do so.

2. Encryption for inflow and outflow of traffic from Ken 7 windows environment will monitor any personal devices which is connected to Ken 7 windows network.

3. The implementation of Kerberos authentication will deny anonymous users access to protected resources in Ken 7 infrastructure.

4.All personnel will be taught the network policies  to avoid sending report to unsecured printers.

5.  The more complex passwords are, the more secured the server will be. A complex password should be enforce for network security.

8 0
3 years ago
Other questions:
  • Chdtp aoxophg gr72 ae9>3 zqqz
    12·1 answer
  • You have no control over who views your social network information
    13·2 answers
  • What is the output of the second println statement in the main method? public class Foo { int i; static int s; public static voi
    14·1 answer
  • When you park on a hill, think about which way _____.
    6·2 answers
  • What can act as a buffer against unemployment
    11·1 answer
  • Which CSS attribute would change an element's font color to blue
    15·2 answers
  • Which type of computing device is best suited to having a digital pen as an input device?
    9·1 answer
  • You need to design a backup strategy. You need to ensure that all servers are backed up every Friday night and a complete copy o
    6·1 answer
  • Operating systems provide a measure of security by allowing users to access to those resources they've been cleared to use as we
    8·1 answer
  • Write a list comprehension statement to generate a list of all pairs of odd posi
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!