Answer:
Technology allows digital notes to be shared on the Internet.
Explanation:
The productivity of a business depends on how things are done faster. To complete your work faster it is important to develop typing skills. Typing helps you to work comfortably on the computer, it aids in communicating with colleagues and customers, creating documents, and finding new information.
Hopefully this helped.
Answer:
def getChar():
while True:
in1 = input('Enter first char: ')
try:
if len(in1) != 1:
raise
else:
in2 = input('Enter second char: ')
if len(in2) != 1:
raise
else:
break
except:
print('Enter just one character')
return in1, in2
def chars2string(in1,in2):
print(in1*5 + in2*5)
def main():
ls = getChar()
in1 = ls[0]
in2 = ls[1]
chars2string(in1, in2)
if __name__ == '__main__':
main()
Explanation:
The programming language used is python 3.
The script first defines a function getChar and makes use of a while loop in combination with try and except blocks and IF statements, the code ensures that both inputs that are entered by the user after the prompt are 1 in length. i.e. Just one character. This function returns the two characters that were entered.
The second function that is defined is chars2string this function takes two arguments, It repeats each argument five times and returns a joined string.
Finally, the main function is defined and it calls the getChar function first, the values that are returned by this function is assigned to two variables, that is then passed on to the chars2string function. The main function is called and the Joined string is printed to the screen.
Answer:
The best answer is "B"
xfs_fsr
Explanation:
The is a typical format of the command to use:
xfs_metadump -o /dev/sdb1 /reviewxfs
Answer:
Privacy
Explanation:
In the privacy control access mechanism it control the data of the personal information.The model P-RBAC that is the framework of key component that extended the RBAC model that gives the complex policy of privacy such as obligations.In the P-RBAC we defined the privacy awareness permission.
The privacy control access mechanism giving the right to control the personal information.