1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kifflom [539]
3 years ago
8

Ways to ask for help effectively include

Computers and Technology
1 answer:
Step2247 [10]3 years ago
8 0

Answer:

All of these choices

Explanation:

Clarity → the quality of being coherent and intelligible.

Sincerity → the quality of being free from pretense, deceit, or hypocrisy

Open mind → Open-mindedness is receptiveness to new ideas.

You might be interested in
James, a technician, is tasked to remove the dust inside of a desktop computer.
muminat

Answer:

The complete Question is:

James, a technician, is tasked to remove the dust inside of a desktop computer. Which of the following should the technician use to MINIMIZE exposure to the dust while protecting internal hardware components? (Select TWO).

A. Mask

B. ESD mat

C. ESD strap

D. Antistatic bag

E. Safety goggles

F. Rubber gloves

The Answer is: A and E

Explanation:

Mask are objects that are used for covering the face for protection and disguise. In this scenario, the mask will protect his nostrils from dust during the cleaning activity.

While safety goggles are a type of personal protective equipment (PPE) that is worn over the eyes for its protection.

6 0
4 years ago
GDP measures the production levels of any nation. This implies a correlation between production levels and ____________.
loris [4]
<span>C. Average Income ih ope this helps

</span>
4 0
3 years ago
Which of the following is not true?A. An organization may express its cybersecurity state through a Current Profile to report re
STALIN [3.7K]

Answer: B. Only critical infrastructure agencies may establish a Target Profile that can be used among their constituents as an initial baseline Profile to build their tailored Target Profiles.

Explanation:

Of the options given in the question, the option that is false is option B "requirements.B. Only critical infrastructure agencies may establish a Target Profile that can be used among their constituents as an initial baseline Profile to build their tailored Target Profiles".

This is not true as the establishment of a target profile is not meant for the critical infrastructure agencies alone. Other infrastructural agencies or companies can also establish the target profile.

8 0
3 years ago
What kind of sampling does a quasi experiment use?
Andrej [43]
A quasi experiment does not use completely randomized sampling where every participant in a certain sample would be allocated completely by chance and would have the same chance of becoming the member of a sample. Rather, quasi experiments have selective sampling where participants have been allocated to a certain sample by a certain criteria which makes the sample not completely random. 
5 0
4 years ago
PYTHON
Nina [5.8K]

Answer:

This is one of the efficient ways to find the number of occurrences of a given number in a list:

<h3><u>def find_num(arr,n):</u></h3><h3><u>    return len([count for count in arr if count == n])</u></h3><h3><u>print(find_num([0,1,1,1,0],1))</u></h3>

If you want a simpler version, you can try this:

<h2><u>def find_num(arr,n):</u></h2><h2><u>    count = 0 </u></h2><h2><u>    for i in range(len(arr)): </u></h2><h2><u>        if arr[i]==n: </u></h2><h2><u>            count += 1 </u></h2><h2><u>    return count</u></h2><h2><u>print(find_num([0,1,1,1,0],1))</u></h2>

This is the simplest method:

<h2><u>arr = [0,1,1,1,0]</u></h2><h2><u>print(arr.count(1))</u></h2>

I think I gave you enough examples. This should get you started off easily.

If you need an explanation, I am happy to help you. BTW I started python 6 months back so even I am pretty new to this.

4 0
3 years ago
Other questions:
  • An employee wants to create a fake employee identification number as part of a fraud scheme. Which of the following controls wou
    15·1 answer
  • The linux command _______ can be used to list the current disk devices connected to the computer.
    8·1 answer
  • NASA’s long term goal is for travel in space to be as _________________ as travel across the Atlantic. However, we are _________
    10·2 answers
  • The rules that determine what is allowed in a program are known as the
    14·1 answer
  • Because public key encryption requires the use of two different keys, it is also known as _____ encryption
    13·1 answer
  • gAssume that you are writing a program to merge two files named FallStudents and SpringStudents. Each file contains a list of st
    15·1 answer
  • What is key for evaluating internal controls such as human resources, logistics, information technology, risk, legal, marketing
    11·1 answer
  • The basic assumption that underlines event driven modeling is that the system can be represented as a model with an infinite num
    9·1 answer
  • The spreadsheet below shows the age, grade level, major, and minor of four students in college. A purple background in the
    5·1 answer
  • Write a pseudocode to print the sum of first 10 terms in the series: <br> 2, 4, 9, 16, 25…
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!