1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex Ar [27]
3 years ago
12

Which of the following is not true about a list of lists

Computers and Technology
1 answer:
Thepotemich [5.8K]3 years ago
3 0

Answer:

Where's the list??

You might be interested in
Someone please help fast! I’m taking the test rn and I don’t understand this!!!!!!
andrezito [222]

Answer:

the mistake that was made by allen is that he was not suppose to hire a highly proficient technician to install the heating and cooling system in the granary.

7 0
3 years ago
A strategy to solve a logic problem is to break it into steps. Using the drop-down menu, complete these sentences about solving
PSYCHO15rus [73]
I think the answer is 3!!
3 0
3 years ago
Read 2 more answers
Which science topics would be suited for this organizational aid? Check all that apply.
IrinaVladis [17]

Answer:

Its A and E

Explanation:

3 0
3 years ago
1. Grade data is:
horrorfan [7]

Answer:

1.)

import math

def min_max(lst):

   minimum = math.inf

   maximum = -math.inf

   for x in lst:

       if minimum > x:

           minimum = x

       elif maximum < x:

           maximum = x

   return minimum, maximum

2.)

def deltaGrade(lst):

   sm = 0  #sm is sum

   for x in lst:

       sm += x

   mean = sm/len(lst)

   deltaG = 75 - mean

   return deltaG

7 0
4 years ago
"what is the problem with using challenge handshake authentication protocol (chap) as an authentication protocol?"
Alexxandr [17]

Its use of the message digest 5 (MD5) hash algorithm for security.

CHAP uses a combination of MD5 hashing and a challenge-response mechanism, and authenticates without sending passwords as plaintext over the network. The security of the MD5 hash function is severely compromised.

5 0
3 years ago
Other questions:
  • HURRYYY A friend of yours has E-mailed their English paper to you so that you can proofread it. Explain the tools you would use
    15·1 answer
  • To insert a new slide in an existing presentation, what menu should you select?
    5·2 answers
  • If johnny has 800 socks and john has 1000 more how much does john have
    9·1 answer
  • HELPPPP!!
    8·2 answers
  • Can an iphone user see when an android user is typing
    10·2 answers
  • Concept about borderless classroom because of technology​
    9·1 answer
  • How can you represent a graphic element in a wireframe?
    5·1 answer
  • What does a page break do?
    13·1 answer
  • My serious question that needs answering pronto!!!
    11·1 answer
  • What does an effect allow you to do in<br> EarSketch?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!