1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
7nadin3 [17]
3 years ago
9

What is the answer to this?

Computers and Technology
1 answer:
Anit [1.1K]3 years ago
5 0

Answer: I think the Valorous Unit Ribbon

Explanation: I don't really understand what's it asking but I sort of did to get this answer!

You might be interested in
Ziffcorp, an it firm, uses a technology that automatically updates the antivirus software in all the computers in the firm whene
GaryK [48]
Ziffcorp, an it firm, uses a technology that automatically updates the antivirus software in all the computers in the firm whenever the software becomes outdated. it is evident that Ziffcorp uses <span>push technology </span> for automatically updating the antivirus software. The push technology is I<span>nternet based communication system in which the transaction request is generated by the publisher or central web server.</span>
4 0
3 years ago
Cloud architects have been largely replaced by ScrumMasters.<br><br> True<br><br> False
Kitty [74]
True much larger than scrum masters
6 0
3 years ago
Read 2 more answers
Question 6 Which of the following statements about datasets used in Machine Learning is NOT true? 1 point Testing data is data t
Inessa [10]

Answer:

Training data is used to fine-tune the algorithm’s parameters and evaluate how good the model is

Explanation:

The statement about datasets used in Machine Learning that is NOT true is "Training data is used to fine-tune algorithm’s parameters and evaluate how good the model is."

This is based on the fact that a Training dataset is a process in which a dataset model is trained for corresponding it essentially to fit the parameters.

Also, Testing the dataset is a process of examining the performance of the dataset. This refers to hidden data for which predictions are determined.

And Validation of dataset is a process in which results are verified to perfect the algorithm's details or parameters

4 0
3 years ago
For question 1-3, consider the following program: def tryIt(a ,b = 7) return a + b
tino4ka555 [31]

Answer:

1)18

2)4

3)28

Explanation:

1) ans= tryIt(2) *2

        = (2+7)* 2 =18

2) ans= tryIt(-5) *2

        = (-5+7)* 2 =4

3) ans= tryIt(7) *2

        = (7+7)* 2 =28

3 0
3 years ago
Write a recursive function num_eights that takes a positive integer pos and returns the number of times the digit 8 appears in p
nata0808 [166]

Answer:

Explanation:

The following is written in Java. It creates the function num_eights and uses recursion to check how many times the digit 8 appears in the number passed as an argument. A test case has been created in the main method and the output can be seen in the image below highlighted in red.

  public static int num_eights(int pos){

       if (pos == 0)

           return 0;

       if (pos % 10 == 8)

           return 1 + num_eights(pos / 10);

       else

           return num_eights(pos / 10);

   }

7 0
3 years ago
Other questions:
  • Consider that a large online company that provides a widely used search engine, social network, and/or news service is consideri
    12·1 answer
  • The protocol that enables computers on the Internet to communicate with one another is called _____.
    10·2 answers
  • What does prominent hyperintensity mean relating to MRI?
    5·1 answer
  • Which type of address is used at the transport layer to identify the receiving application?
    14·1 answer
  • What two protocols are used for remote access to a server, using unencrypted and encrypted transmissions respectively? answer
    13·1 answer
  • A cable that connects the computer to the printer is an example of<br> A.hardware<br> B.software
    13·2 answers
  • When you make a DNS query, where does your computer first check to find an IP address to name mapping?
    8·1 answer
  • Please someone helpp
    12·2 answers
  • What is the largest value that can be represented by 6 binary digits? .
    5·1 answer
  • What is 2+2 I need to know hurry
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!