1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergiy2304 [10]
2 years ago
14

8.5 Edhesive Code Practice

Computers and Technology
1 answer:
Lynna [10]2 years ago
8 0

Answer:

Check explanation

Explanation:

#Print original quote

twainQuotes = ["I have never let my schooling interfere with my education.",

"Get your facts first, and then you can distort them as much as you please.",

"If you tell the truth, you don't have to remember anything.",

"The secret of getting ahead is getting started.",

"Age is an issue of mind over matter. If you don't mind, it doesn't matter. "]

print(twainQuotes)

#Sort and print

twainQuotes.sort()

print(twainQuotes)

#Insertion of quote, sort, then print

twainQuotes.extend(["Courage is resistance to fear, mastery of fear, not absence of fear."])

twainQuotes.sort()

print(twainQuotes)

mark as brainliest pls hehe

You might be interested in
Who want followers on Instagram... gotta follow back
Alexxx [7]

Explanation:

I dont have Instagram....

6 0
2 years ago
Read 2 more answers
You are hired as an IT consultant for the government owned mobile operating company, Teletalk. Based on the following scenario,
morpeh [17]

Answer:

An IT consulting report may be a transcript created via an IT professional that addresses all the possible aspects of an enterprise or a corporation. It is often an aggressive analysis report, Project reputation report, Business Plan report, or a Supply Chain Model file

Let's see how to write this kind of report

(1) Introduction.

(2) Point out the problems.

(3) Addressing the problems.

(4) business model and competitive analysis.

(5) Conclusion.

Explanation:

Teletalk may be a government telecommunication company. it's been going out of the marketplace for quite a little bit of time and is thanks to a scarcity of human resources and innovative applications within the field.

The company uses outdated Customer Management Systems (CMS) now so as to research potential customers and gather information about them. they need to be battling retaining customers after a brief period of your time. Their customer service isn't fair and therefore the customers aren't satisfied with the service provided by the corporate.

In order to function well, they need to implement enterprise resource planning ( ERP) data systems.

A data system is everything starting from Human resources to hardware and software. they will be applied everywhere from Customer Retainment and Engagement they're termed as Customer Management Systems and if it's wont to Business Model of any organization then it's referred to as Enterprise Resource Planning Systems (ERP).

By incorporating information systems in teletalk there is often a performance improvement in Sales, Management, Technology, and D-S (Demand-Supply Model).

All these are going to be an excellent advantage to teletalk so teletalk should anticipate innovating the present system with a more reliable and efficient one

6 0
2 years ago
5. The coordinates of triangle ABC are A(-7, 3), B(3, -7) and C(8. 8)
kati45 [8]

Answer:

b

Explanation:

6 0
3 years ago
Read 2 more answers
Which of the following is not one of the four methods for classifying the various instances of malware by using the primary trai
BlackZzzverrR [31]

Answer: Source

Explanation: The malware is the software persisting malicious approach to cause the damage/loss.The primary trait of the malware are infection,concealment,etc.

The concealment refer to the malware such as the Trojan horse, and other viruses that has only purpose to cause the malfunctioning in the system.The virus that get into the other software and then damage the system in known as the infectious malware .

The circulation is the transferring of the virus in the circular manner between the system for the damaging.Thus,the only trait that is not the part of the malware is source.

4 0
3 years ago
Which statement regarding hard drives is incorrect?
Veseljchak [2.6K]

Answer: I think the answer is

c. solid state drives are less expensive than magnetic hard drives

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • Make a program that (i) asks the user for a temperature in Fahrenheit degrees and reads the number; (ii) computes the correspond
    8·1 answer
  • 2. What is the layout of the modern keyboard known as?
    13·1 answer
  • Write a program that inputs a time from the console. The time should be in the format "HH:MM AM" or "HH:MM PM". Hours may be one
    6·1 answer
  • The feature that moves text from the right edge of a paragraph to the beginning of the next line as necessary to fit within the
    12·1 answer
  • The famous study entitled ""Protection Analysis: Final Report"" focused on a project undertaken by ARPA to understand and detect
    14·1 answer
  • Greg works outside. He is often found cutting grass and making the local park grounds look nice for guests.
    10·1 answer
  • How do professionals address their problems?
    14·2 answers
  • How are web design & web development different from each other?
    9·1 answer
  • The first step to keeping your home safe is to minimize the overall amount of _______________ materials you store in your home.
    13·1 answer
  • You are writing code to store the length of a side of a square. Which one is a good variable name
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!