1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NikAS [45]
3 years ago
6

What will be the answer?

Computers and Technology
2 answers:
Usimov [2.4K]3 years ago
6 0

Answer:

NumPy

Explanation:

nirvana33 [79]3 years ago
3 0
B. Numpy is your answer
You might be interested in
Please help me with Excel!!! A lot of points!
yaroslaw [1]

Answer:

=((SUM(PUT RANGE OF MOTHLY EXPENSES HERE)*12)+SUM(PUT RANGE OF YEARLY EXPENSES HERE))/12

Explanation:

Adds all of the Monthly Expenses : SUM(PUT RANGE OF MOTHLY EXPENSES HERE)

Multiplies the result by 12: *12

Then adds all of the Yearly Expenses to the product of Steps 1 and 2 : SUM(PUT RANGE OF YEARLY EXPENSES HERE)

Divides this new sum by 12: /12

=((SUM(PUT RANGE OF MOTHLY EXPENSES HERE)*12)+SUM(PUT RANGE OF YEARLY EXPENSES HERE)/12)

6 0
3 years ago
Java provides a number of interfaces and classes to systematically implement collections.
solmaris [256]

Answer:

A) True

Explanation:

Java provides collections architecture or framework used to store and manipulate a group of objects or collections.

The collection framework has interfaces which include; Set, Queue, Deque, List, as well as classes which include; Hashset, ArrayList, LinkedList, LinkedHashset, PriorityQueue, Vector and TreeSet.

There are also many methods declared in the collection interface which include; add(), addAll(), remove(), removeAll(),retainAll(), clear(), size(), iterator(), toArray() etc

4 0
3 years ago
A news company is planning to use a Hardware Security Module (CloudHSM) in AWS for secure key storage of their web applications.
lakkis [162]

Answer:

you cannot obtain a new copy of the keys that you have stored on Hardware Security Module, because they are lost forever and a new copy cannot be obtained if a copy is not kept somewhere.

Explanation:

Hardware Security Module (CloudHSM) is a cloud-based hardware security module (HSM) that provides the user the opportunity to create and utilize your own encryption keys on the AWS Cloud. It is a fully managed service that takes care of time-consuming administrative activities such as software patching, backups, hardware provisioning, and high-availability for the user.

One of the key elements of the Hardware Security Module (CloudHSM) is that a copy of the keys stored must be kept somewhere because if keys are lost, they are lost forever and a new copy cannot be obtained if a copy is not kept.

Therefore, you cannot obtain a new copy of the keys that you have stored on Hardware Security Module, because they are lost forever and a new copy cannot be obtained if a copy is not kept somewhere.

5 0
3 years ago
15. How many PC’s can be connected to a UPS?
Alex_Xolod [135]

Answer: Depends on the power of the computer /computers and the UPS

Explanation: For someone who had a big connected network of computers and printers we would plug the computer or server into the UPS as well as the monitor and sometimes a printer sometimes the monitor was plugged into the wall

When you get a UPS you must plug it in for a certain time could be hours or even a day.  A USP has a big battery in it and you must charge it (sometimes it comes semi-charged but you must plug it in to strengthen it. )

there are two connector wires that you affix to the battery and you must put a lot of strength into it to make it secure.

So in closing, you can get away with two like a desktop and a laptop.

Read your documentation that comes with the UPS

6 0
2 years ago
Alcohol is considered a _____ drug
andreyandreev [35.5K]
Bad.......................
8 0
4 years ago
Read 2 more answers
Other questions:
  • What is software that helps a computer operate efficiently and keeps track of data on a computer?
    14·1 answer
  • Suppose as a computer programmer, you have been assigned a task to develop a program to store the sorted data in ascending order
    9·1 answer
  • 01010010 01100101 01100001 01101100 00100000 01101101 01110101 01110011 01101001 01100011 00100000 01110100 01101001 01101100 01
    5·2 answers
  • Imagine the user types in a complete sentence, but we want to read only the first word and place it in the String variable word.
    11·1 answer
  • When dealing with a person who is behaving violently you should argue with them. A. False B. True
    5·1 answer
  • Which renewable resources are available at any time?​
    15·1 answer
  • Which of the following is a strategy used to enhance communication in a presentation?
    14·1 answer
  • The operating system is not responsible for allowing one computer to share information with other computers.
    15·2 answers
  • ¿Quién recibe la orden de ejecución de un programa enviada por el usuario?
    9·1 answer
  • WILL GIVE BRAINLIEST!! NO LINKS!!!
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!