1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
asambeis [7]
3 years ago
8

Consider the following code: def tryIt(b): for i in range(len(b)): b[i] = b[i] + 100 #***********MAIN************ x = [] x = [56

, 78, 88] print(x) tryIt(x) print(x) [156, 178, 188] [156, 178, 188] [56, 78, 88] [156, 178, 188] [56, 78, 88] [56, 78, 88]
Computers and Technology
1 answer:
WINSTONCH [101]3 years ago
7 0

Answer: I took a high school robotics class when I was in 5th grade and I don't even understand your code there aren't any instructions other than <em>"</em><em><u>Consider</u></em><u>"</u> the following code you may want to improve your question

You might be interested in
PLEASE HELP!!<br> giving loads of points<br> create the python codes for the images
o-na [289]
I’m really bad with python lol
6 0
3 years ago
Suggest how the following requirements might be rewritten in a quantitative way. You may use any metrics you like to express the
kotegsom [21]

Answer:

Did you get the answer yet or not or should i sent it?

Explanation:

3 0
3 years ago
tiny electrical paths to connect everything together is called ? A. graphic card B. audio card C. CPU D. Motherboard
k0ka [10]

Answer:

Option C, or the CPU.

Explanation:

The audio card simply translate code into sound, the graphic card turns code into graphics, CPU runs electric through tons of little electric pathways, and the motherboard is the object of which all of the above are rested on and connects them together.

8 0
3 years ago
HELP ME PLEASE
MAXImum [283]

Explanation:

Threats

Computer Security Threats are possible dangers that can affect the smooth functioning of your PC. These may be a small piece of adware or a harmful Trojan malware. In the present age, computer security threats are constantly increasing as the world is going digital. computer security threats

Types of Computer Security Threats

There are several types of computer security threats such as Trojans, Virus, Adware, Malware, Rootkit, hackers and much more. Check some of the most harmful types of computer Security Threats.

COMPUTER VIRUS

A Computer Virus is a malicious program, which replicates itself and infects the files and programs of your PC and can make them non-functional.

COMPUTER WORMS

A self-replicating computer program that spreads malicious codes, computer worms make use of the network to send copies of the original codes to other PCS. It can also go to the extent of sending transferring documents utilizing the email of the user.

SCAREWARE

Scareware is a malware that tricks victims to buy software by displaying fake virus alerts. A scareware infected PC may get pop-ups of fake malware threats and to get rid of those, users are prompted to purchase a fake anti-malware software.

KEYLOGGER

Also known as a keystroke logger, Keyloggers can track the real-time activity of a user on his computer. Keylogger runs in the background and records all keystrokes made by a user and passes the information to the hacker with the motive to steal password and banking details.

ROOTKIT

A rootkit is considered extremely dangerous as they appear to be legitimate files and deceives the computer user. Rootkit masks viruses and worms and makes them appear as necessary files. These are very difficult to remove and only an antivirus with the anti-rootkit feature can remove a rootkit.

Tips for Best Computer Security

For best computer security, you must follow certain guidelines, which are also called computer best practices. 1. Use the best antivirus software, which not only provides protection to your PC but also internet protection and guards against cyber threats. 2. Do not download untrusted email attachments and these may carry harmful malware. 3. Never download software from unreliable sites as they may come with a virus that may infect your system as soon as you install the software.

4 0
2 years ago
Which of the following documents specifies the uptime guarantee of a web server?A. Due processB. Due diligenceC. Scope of workD.
Harrizon [31]

Answer: D) Service Level Agreement.

Explanation: A service Level Agreement, also known by the acronym SLA, is a written agreement between a service provider and its customer in order to set the agreed level for the quality of such service. The SLA is a tool that helps both parties reach a consensus in terms of the level of service quality, in aspects such as response time, time availability, available documentation, personnel assigned to the service, among others.

6 0
3 years ago
Other questions:
  • Which of the following correctly describes the reason for quality customer service?
    15·2 answers
  • *Could someone please help me with this***
    5·1 answer
  • System requirements that are important in determining if a software program will work on a computer are ____.
    8·1 answer
  • The ability to anticipate and determine upcoming driving hazards and conditions are adversely affected by stress.
    10·1 answer
  • You share a number of files from your computer, and you've received a number of calls from users who say they can't connect to t
    5·1 answer
  • In the context of a global information system (GIS), _____ networks offer electronic data interchange standards, encryption, sec
    10·1 answer
  • How does this happen on brainly????
    12·2 answers
  • PLEASE HELP ILL GIVE BRAINLIEST IMMEDIATLEY TO THE CORRECT ;-;
    10·1 answer
  • Describe how serial data access finds data
    9·2 answers
  • In disc brakes, pads are forced against the of a brake disc​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!