1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
musickatia [10]
3 years ago
11

A list cannot use appendleft but a _____ can.

Computers and Technology
1 answer:
Dmitry [639]3 years ago
3 0

Answer:

String

Explanation:

I think it is this one.

You might be interested in
Files and e-mail messages sent over the Internet are broken down into smaller pieces called _____.
Fynjy0 [20]
Files and email messages sent over the internet are broken down into smaller pieces called packets
6 0
3 years ago
Does technology always follow the science, yes or no and explain the reason your choice
kari74 [83]

Answer:

<h2>NO</h2>

Explanation:

<h2>because Technology does not always follow science but it may actually lead science in some instances. An example is weather forecasting.</h2><h2>Mark me brainliest plz</h2>
7 0
3 years ago
Technician A says that there are two types of battery cells, primary (non-rechargable) and secondary. Technician B says there ar
Scrat [10]

Technician A is correct.

Electrochemical batteries can be classified into two main categories; Primary Cells and Secondary Cells.

A primary battery or cell cannot easily be recharged after use and is usually recommended to be discarded following discharge. Most primary cells are termed dry due to their capability of utilizing electrolytes contained within absorbent material.

A secondary cell, on the other hand, can be recharged electrically to their original pre-discharge condition.

4 0
3 years ago
Read 2 more answers
#Write a function called find_median. find_median #should take as input a string representing a filename. #The file correspondin
azamat

Answer:

Explanation:

The following is written in Python. It takes in a file, it then reads all of the elements in the file and adds them to a list called myList. Then it sorts the list and uses the elements in that list to calculate the median. Once the median is calculated it returns it to the user. The code has been tested and the output can be seen in the image below.

def find_median(file):

   file = open(file, 'r')

   mylist = []

   for number in file:

       mylist.append(int(number))

   numOfElements = len(mylist)

   mylist.sort()

   print(mylist)

   if numOfElements % 2 == 0:

       m1 = numOfElements / 2

       m2 = (numOfElements / 2) + 1

       m1 = int(m1) - 1

       m2 = int(m2) - 1

       median = (mylist[m1] + mylist[m2]) / 2

   else:

       m = (numOfElements + 1) / 2

       m = int(m) - 1

       median = mylist[m]

   return median

print("Median: " + str(find_median('file1.txt')))

5 0
3 years ago
Which of the following remote access security technologies performs authentication through a three-way handshake (that is, chall
levacccp [35]

Answer:

CHAP

Explanation:

CHAP allows a client to be authenticated without sending credential information across a network.

7 0
3 years ago
Other questions:
  • Here's something to stop you from getting repetitive when writing essays. Write a program that reads multiple lines of plain tex
    15·1 answer
  • Did you see the fire, uh, fireworks last night? Which of the following sentences is the most correct way to format this accordin
    15·2 answers
  • Which of the following would be considered a strong password?
    5·2 answers
  • Write a function called calculate() that accepts three integer Numbers as arguments, compute these values : Sum and Product and
    7·1 answer
  • Which button could Pamela press in the Microsoft Word spell checker to make the word “colour” instantly change to “color” whenev
    11·1 answer
  • Vector testGrades contains NUM_VALS test scores. Write a for loop that sets sumExtra to the total extra credit received. Full cr
    7·1 answer
  • _____ can render data useless to unauthorized users who might have violated some of the database security layers.
    7·1 answer
  • For the description below, develop an E-R diagram:
    9·1 answer
  • According to the video, some workers who work for themselves, such as Actors, Musicians, or Writers, may have what sort of worke
    7·1 answer
  • IN WHICH COUNTRY DO THEY LET YOU PLAY MINECRAFT IN SCHOOL?
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!