1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VladimirAG [237]
3 years ago
13

B. Directions: Fill in the blanks with the correct answer.

Computers and Technology
1 answer:
aniked [119]3 years ago
4 0

Answer:

  1. TONGS
  2. BASKET
  3. THERMOMETER
  4. AUTOCLAVES
  5. ELECTRIC KNIFE
  6. VACUUM
  7. STETHOSCOPE
  8. BLENDER
  9. DISHWASHER
  10. WASHING MACHINE
You might be interested in
in an advertisement is made of a wireless keyboard and a mouse.Name two commonly used methods of connecting devices wirelessly​
DENIUS [597]

Answer:

Wireless LAN

Wireless MAN

Explanation:

I use these methods to connect my wireless devices all of the time and most of my friends do it as well so I am pretty sure it is a commonly used method.

3 0
3 years ago
What is the output of the code below assuming that global variable x has value 2 and global y has value 3? def f1(): return "ab"
Lostsunrise [7]

Answer:

ababababab

Explanation:

The code above is written in python and python uses indentation .So let me rephrase the code accordingly and explain what the code really do.

Note x and y is a global variable which can be used by any of the function declared.  According to the question x and y are 2 and 3 respectively

The first block of code describes a function f1 without any argument but the code should return the string "ab"

def f1():

      return "ab"

The second block of code defines a function f2 and returns the value of f1 multiply by x. This means you are multiplying the string "ab" by 2 which will be equals to abab

def f2():

           return f1() * x

The third block of code declared a function f3 and returns the sum of  f2 and product of f1 and y. using PEMDAS principle the multiplication aspect will be solved first so, ab × 3 = ababab, then we add it to f2  . ababab + abab = ababababab.

def f3():

        return f2() + f1() * y

Finally, we print the function f3 value to get ababababab

print(f3())

If you run the code on your IDE like below you will get  ababababab

x = 2

y = 3

def f1():

      return "ab"  

def f2():

      return f1() * x  

def f3():  

      return f2() + f1() * y  

print(f3())

     

7 0
3 years ago
قواعد البيانات الموزعه​
Monica [59]

Answer:

Translation : Distributed Databases

Explanation:

6 0
4 years ago
The _______ command was developed by nicholas harbour of the defense computer forensics laboratory.
Lena [83]
Hi! The answer is dcfldd
3 0
3 years ago
For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the intern
VikaD [51]

Answer:

ICMP

Explanation:

3 0
3 years ago
Other questions:
  • SP 800-14, Generally Accepted Principles and Practices for Securing Information Technology Systems, provides best practices and
    12·1 answer
  • Submit your 300-word essay describing the equipment usedI in a well-equipped studio’s audio department and the training and expe
    8·2 answers
  • Qazwsxedcrfvtgbyhnujmikolp. In which direction on the keyboard did I type in?
    14·2 answers
  • You're familiar with the story of Hansel and Gretel, so when you decide to go exploring you always make sure to keep track of wh
    14·1 answer
  • This LEGENDARY character made a much-celebrated comeback in 2017. What was the name of the villain he faced in this epic tale?
    7·2 answers
  • Which feature does the web designer fail to apply in this layout for a web page? A. harmony
    8·2 answers
  • A technician selected the GUI interface on a wireless router and added a DNS address of 208.67.220.220. The technician then imme
    6·1 answer
  • What Is one reason that more personal computers have windows operating systems as opposed to Mac operating systems
    7·2 answers
  • Installing unauthorized hardware such as a communication software and modem Select one: a. Is a common practice and does not aff
    8·1 answer
  • Write a program with a car's miles/gallon and gas dollars/gallon (both floats) as input, and output the gas cost for 10 miles, 5
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!