1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
allochka39001 [22]
3 years ago
6

Random.choice will choose a number between 1 and 100. True False​

Computers and Technology
1 answer:
DaniilM [7]3 years ago
6 0

Answer: False.

Explanation: Random.choice can choose between any 2 numbers.

You might be interested in
Describe a situation in which you have experienced harm as a consequence of a failure of computer security. Was the failure mali
frutty [35]

Answer: The goals of computer security are to protect computers and users from data theft or loss as well as damage to any part of the computer.

Explanation: Common means of achieving computer security are firewalls, anti-virus software and this can fail due to hardware problems  or   weaknesses that prevent malicious attacks.

To answer this question, think of a time when you experienced any one of these. For example, personally, I was once an unfortunate victim of a general malicious attack that took advantage of a weakness in my anti-virus software. After clicking on a link on a dodgy website, a virus was installed on my computer. My computer finally crashed, without any hope of restarting it. I lost all my data and I had to buy a new computer.  This was a malicious attack.

However, sometimes people can be specifically targeted to steal their data or monitor their activities.  

7 0
3 years ago
What doe the & operator do in python programming software
ArbitrLikvidat [17]
Hardware software is the answer
5 0
3 years ago
What correlation is obtained when the pearson correlation is computed for data that have been converted to ranks?
professor190 [17]

The correlation that is obtained when the pearson correlation is computed for data that have been converted to ranks is option A) The Spearman correlation.

<h3>What is Spearman correlation used for?</h3>

Spearman's correlation is known to be one that tends to look into or measures the strength and way of monotonic relationship between two variables.

It is one that is a nonparametric measure that is often known to be rank correlation and it tends to examine  how well the association between two variables can be said to using a monotonic function.

Hence, The correlation that is obtained when the pearson correlation is computed for data that have been converted to ranks is option A) The Spearman correlation.

Learn more about correlation from

brainly.com/question/12479370

#SPJ4

See full question below

) What correlation is obtained when the Pearson correlation is computed for data that have been converted to ranks?

A) The Spearman correlation

B) The point-biserial correlation

C) The phi coefficient

D) It is still called a Pearson correlation

8 0
2 years ago
Which folder(s) are commonly used in the Navigation Pane of Outlook? Check all that apply.
tensa zangetsu [6.8K]

The Navigation Pane in Outlook is used to switch between the different areas of Outlook,such as Mail, Calendar, Contacts, Tasks, and Notes., the Navigation Pane displays the folders within the view you are working with. The following folders are commonly used in the Navigation Pane in Outlook:

Inbox

Sent Items

Deleted Items

They are most commonly included in the Favorites.

6 0
3 years ago
3. The Central Processing Unit is made of
monitta

Answer:

a

Explanation:

jjwjwjwwjwjwjwjwjwj#k#kwkekee

4 0
2 years ago
Other questions:
  • Which of the following functions and expressions will convert the ASCII character "Z" to its numeric equivalent ASCII code?
    7·1 answer
  • What type of file can most software applications read?
    5·2 answers
  • Generate the requested sets using only set builder notation and the provided sets. Some problems may require you to build one or
    15·1 answer
  • Which are Career and Technical Student Organizations? (Check all that apply.)
    12·1 answer
  • What best describes "broadband access"? a. broadband access is a specific term used to describe the delivery of one-way televisi
    5·1 answer
  • A small company has hired you to take over its IT needs. The company currently has seven on-site employees and 12 remote employe
    12·1 answer
  • Ryan would like to copy a list of contacts from a colleague into his personal address book. The list of contacts is
    9·1 answer
  • List the types of infrared we have
    12·1 answer
  • The Uniform Electronic Transmission Act (UETA) a. declares that e-signatures are invalid. b. has only been adopted in a handful
    8·1 answer
  • PLEASE HELP How have phones made us spoiled? How have phones made us unhappy?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!