1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ddd [48]
2 years ago
8

Write a statement that slices a substring out of the string quote and puts it into a variable named selection. If given the stri

ng 'The only impossible journey is the one you never begin.', selection should contain 'possible jou' after your statement executes.
Computers and Technology
1 answer:
Daniel [21]2 years ago
8 0

The statements that slices a substring out of the string quote and puts it into a variable named selection is as follows:

text = "The only impossible journey is the one you never begin."

selection = ""

selection += text[11:23]

print(selection)

The code is written in python.

The string is stored in a variable called text.

The variable selection is declared as an empty string. The purpose is to store our new substring.

The third line of the code is used to cut the string from the 11th index to the 23rd index(excluding the 23rd index) and add it to the declared variable selection.

Finally, we output the variable selection by using the print statement.

The bolded values in the code are python keywords.

read more; brainly.com/question/20361395?referrer=searchResults

You might be interested in
Decision making at the executive or strategic level requires business intelligence and knowledge to support the uncertainty and
Marianna [84]

Answer:

Executive information system ( EIS )

Explanation:

  • Other name of executive information system is executive support system.
  • It helps in decision making needs.
  • It gives simple access to internal and external data important to authoritative objectives.  
  • EIS more focuses on graphical display
  • They offer solid reporting and drill-down capacities.
  • In recent time EIS is more used in business intelligence.
8 0
3 years ago
1. Why is it important to compare features of a computer before making a purchase?
Ede4ka [16]
1. Because you can get the same features for a better price
2. CPU, GPU, RAM, Storage, OS, etc.
7 0
3 years ago
Read 2 more answers
By definition, what is the process of reducing security exposure and tightening security controls?
saw5 [17]

Hardening is the technique of reducing security exposure and tightening security controls of software and network devices.

Security is a major concern, when connecting over a network. Through hardening, security of a network is protected from vulnerable activities. Hardening reduces exposures associated with security and provides tight controls for it.

Hardening is typically a collection of tools and techniques that are used to decrease vulnerability in computer software, applications, network devices and infrastructure. The main goal of hardening is to protect security by identifying and eliminating superfluous programs, applications, permissions and access, which in turn, reduces the chances that attackers and malware will gain access over the network ecosystem.

You can learn more about hardening at

brainly.com/question/27912668

#SPJ4

7 0
2 years ago
What do you call a commercial transaction beyween a buisness and buisness thatis transactedd online?
VMariaS [17]

Answer:

c.B2b digital transaction

Explanation:

yan lang po sana makatulong

6 0
2 years ago
HELP PLS TIME LIMIT HERE
Novosadov [1.4K]
I do it immediately, so it don’t effect my assignments or grades.
7 0
3 years ago
Other questions:
  • 7 features of QBASIC
    6·1 answer
  • If you purchase a software suite for personal use, you can install the software how many times on how many different machines?
    6·1 answer
  • What item on a business card is generally the most prominent?
    13·2 answers
  • What is the seventh byte in the roller coasters file?
    12·1 answer
  • List and explain the error in the code
    14·1 answer
  • If the base-10 system stops with the<br> number 9, then why isn't it called<br> base-9?
    15·1 answer
  • Explain in your own words how remote-access Trojans (RATs) work. How can these be used by attackers? How would a network adminis
    10·1 answer
  • Which 1947 Invention paved the way for the Digital Revolution?
    12·2 answers
  • Why can't this app have people ask riddles.
    8·1 answer
  • Taran wants to work in the technology field but is unsure of which career to pursue. He has been told he has strong people skill
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!