1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elena-s [515]
3 years ago
8

Sample outputs with inputs 9 5 2 -1 in python.

Computers and Technology
1 answer:
Nezavi [6.7K]3 years ago
7 0
Sorry phsnjajajajqjkakw
You might be interested in
The set of rules for how computers talk to one another
andrezito [222]
That is program ............
4 0
3 years ago
What will happen if you type pseudocode in another language's programming environment and try to run the
wariber [46]

Answer:

You will get compile error

Explanation:

7 0
3 years ago
2. A data catalog identifies all of the following, except: a. Attribute data type b. Attribute range of values c. Attribute cons
alexandr1967 [171]

Answer:

c. Attribute constraints

Explanation:

A data catalog identifies all of the following, except: "Attribute constraints"

The above statement is TRUE because a Data Catalog, a metadata management service, operates by searching for key data, understand and manage data for usefulness.

Data Catalog checks on the BigQuery datasets, tables, and views and checks both technical and business metadata by identifying the following attributes:

1. Data type

2. Range of values

3. Value for Instructor ID

5 0
3 years ago
How do you protect the server from modification by non-root users?
Elis [28]

Answer:

We can protect the server from the modification by using the non root users in many ways as follows:

  • By modifying the PHP settings in the server and by using the configured file as, the configuration of the file is basically depend upon the linux and the PHP script.
  • By disabling the URL from the function of file handling that basically accept the local file as the parameters but it also accept the URL.  It can even now get to outer destinations by utilizing fsockopen or any of the CURL capacities.
  • The safe mode  of PHP is presumably probably the best alternative to secure your server however it very well may be prohibitive. Whenever initiated, experimental mode averts access to records not claimed by Apache and access to condition factors and execution of double projects are likewise debilitated.

4 0
3 years ago
Is this the usb cable that transfers pdf files from a phone to a another computer that doesn't belong to mines?
Dmitrij [34]

yes that is a usb cable

hope that helped

5 0
3 years ago
Other questions:
  • "The term ____ refers to the programs or instructions used to tell the computer hardware what to do."
    6·1 answer
  • Briefly describe the client/server model.
    8·1 answer
  • Write a function chat accepts a pointer to a C-string as its argument. The function should count the number of vowels appearing
    5·1 answer
  • How did mark watney survive the accident
    9·1 answer
  • What does the following code output? System.out.println((5+20 + 5)<br> * (10 / 10))
    9·1 answer
  • The game begins with the player having 20 POINTS
    11·1 answer
  • How can you stay safe on the Internet? Check all that apply.
    8·2 answers
  • Why is the song Twinkle Twinkle Little Star an example of ternary form?
    10·1 answer
  • Can both mediated interpersonal communication and mass communication has an ability to reach huge number of recipients or audien
    11·1 answer
  • 8. Software ____ are individual programs that can be purchased, installed, and run separately, but extract data from the common
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!