1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
weqwewe [10]
2 years ago
8

Assignment 2: room area programming python in Project Stem​

Computers and Technology
1 answer:
White raven [17]2 years ago
8 0

Answer:I love Python, very useful

Explanation:python is very easy and user friendly!

You might be interested in
Complete the sentence
prisoha [69]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer to this question is: Online community technologies.

So, we can fill this question with the correct option as below:

<u>Online community technologies</u> are technologies that support virtual communities and the sharing of content with friends and family.

As we know that online community technologies are those technologies where people of the same group or interest make community virtually online. Where they can share their contents such as pictures, videos, thaught, ideas, etc with the group or family members.

There are different technologies that support virtual communities to share content with friends and family.

Such as Zoom meetings, Sk ype, Face book, Insta gram etc.

8 0
3 years ago
Read 2 more answers
WHAT ACTIONS CAUSE SPAM ON LINKEDIN?
klio [65]

Answer:

LinkedIn has a very smart algorithm, and it has a very strict policy against spammers. Back in 2014, it deleted millions of accounts that were causing spam on LinkedIn.  

Spam occurs:  

1. When you send bulk of connect requests in a short time  

2. When you send irrelevant messages to prospects  

3. When you Perform overactivity  

4. When you use LinkedIn automation tools  

5. When you send spammy and sales-y messages  

All these actions cause spam on LinkedIn, and it immediately takes action against you by restricting your account temporarily or permanently.

4 0
3 years ago
Which of the following operations would best allow you to place 3D building models at their proper height on the terrain (e.g.,
arsen [322]

Answer:

The answer is "Option C"

Explanation:

Base heights are related to it as measurements of height or z-values as they are extracted by mathematics which serves to define the ground of that same world. Once applying a datatype, it can be any entire amount, that will become the level of the function in meters beyond the ground, and wrong choices can be described as follows:

  • In option A, It is a part of extra dimensions object, that's why it is wrong.
  • In option B, It wrong because the offset tool allows the quick and easy offsetting of the lines.
  • In option D, It emphasizes the recovery charts, that's why it is incorrect.
5 0
3 years ago
9. h=
Nadya [2.5K]

Answer:

rs 35.6ko vrs 12. r7 3.3ko vrt 13.

6 0
2 years ago
What is not true of efs
Lemur [1.5K]

Answer:

EFS cannot store files encrypted.

Explanation:

EFS) is a feature introduced in version 3.0 of NTFS that provides filesystem-level encryption. EFS is useful for mobile computer users, whose computer are subject to physical theft, and for storing highly sensitive data. Encryption itself is the method where the information is converted into secret code that hides the information's true meaning. (EFS) is used to encrypt files and folders. EFS is easy to use, with nothing more than a check box in a file’s properties. It is not fully supported on Windows 7 Starter, Windows 7 Home Basic, and Windows 7 Home Premium!

3 0
3 years ago
Other questions:
  • 1. The future of 2D animation does not include hand-drawing. (1 point)
    13·1 answer
  • In Java Write a program that prompts the user for a name (any String value would work for testing), and print a hello message to
    15·1 answer
  • Which type of cable is described as a central conductor wire that is surrounded by insulating materials and placed inside a brai
    13·1 answer
  • Advantage and disavantage of malware maintenance
    12·1 answer
  • Write four overloaded methods called randomize. Each method will return a random number based on the parameters that it receives
    5·2 answers
  • What is the disadvantage of server based network?
    7·2 answers
  • Explain the difference between undecidable problems and unreasonable time algorithms. Be specific.
    5·1 answer
  • 69696969696969696969696969696969696969696969696969696969696969696969696969696969696969696969696969696969696969696969696969696969
    8·1 answer
  • What does command do
    5·1 answer
  • What can be done to solve unemployment problem?​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!