1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
salantis [7]
2 years ago
11

Which top-level domain can be used by anyone, regardless of their affiliation?

Computers and Technology
1 answer:
Firdavs [7]2 years ago
7 0

Answer:

C. org

Explanation:

org is an open domain so anyone is allowed to register a .org domain

You might be interested in
How do you get stickman worriers
ira [324]
You go online and find the answer
8 0
3 years ago
This is science they just dont have the subject buy anyways 
Anna007 [38]
The environment helps us with many many hings thing. The most obvious plants helps us breath and we help them grow because we have the exact opposite breathing pattern. Animals poop almost anywhere they want and farms use it as fertilizer. I hope this enough to help you. Good luck with your work!!<span />
8 0
3 years ago
Read 2 more answers
Write a program that lists all ways people can line up for a photo (all permutations of a list of strings). The program will rea
irinina [24]

Answer:

Check the explanation

Explanation:

Executable Code:

def all_permutations(permList, nameList):

   # Define the function to create a list

   # of all the permutations.

   def createPermutationsList(nameList):

       # Compute and store the length of the list.

       n = len(nameList)

       # Return an empty list if the size is 0.

       if n == 0:

           return []

       # Return the element if the size is 1.

       if n == 1:

           return [nameList]

       # Create an empty list to store the permutations.

       permList = []

       # Start the loop to traverse the list.

       for i in range(n):

           # Store the first element of the current list.

           first = nameList[i]

           # Compute the store the remaining list.

           remaining = nameList[:i] + nameList[i+1:]

           # Start the loop and call the function recursively

           # with the remaining list.

           for perm in createPermutationsList(remaining):

               # Append the element in the permutation list.

               permList.append([first] + perm)

       # Return the permutation list.

       return permList

   # Call the function to compute the permutation list

   # and store the result.

   permList = createPermutationsList(nameList)

   # Start the loop to display the values.

   for perm in permList:

       for val in perm:

           print(val, end = " ")

       print()

# Call the main() function.

if __name__ == "__main__":

   # Prompt the user to enter the input.

   nameList = input().split(' ')

   permList = []

   # Call the function to create and output

   # the permutations of the list.

   all_permutations(permList, nameList)

#endcode

3 0
3 years ago
My friend broke her leg and i wont be able to do this. can one of you do me a solid and finish this while i help her?
const2013 [10]

Answer:

Explanation:Chica, ¿de qué diablos estás hablando? Por favor, sé más específico.

4 0
3 years ago
Read 2 more answers
Consider sending a 1,600-byte datagram into a link that has an mtu of 500 bytes. suppose the original datagram is stamped with t
dsp73

Explanation:

Step one

The maximum size of data field in each fragment = 480

(because there are 20 bytes IP header) Thus the number of required

fragments  =\frac{1600-20}{480} \\\\= \frac{1580}{480} \\\\=3.29\\\\

thus the number of required fragment is 4

Step two

Each fragment will have identification number 291. each fragment except the last one will be of size 500 bytes (including IP header). the offset of the fragments will be 0, 60, 120, 180. each of the first 3 fragments will have

flag = 1; the last fragment will have flag =0

6 0
3 years ago
Other questions:
  • Name size of machine screw that is used to secure switches and receptacles to device boxes
    13·1 answer
  • Ping pc-b from a command prompt window on pc-a. were the pings successful? why?
    11·1 answer
  • what type of authentication does the dod require to accesss sensitive data on mobile devices and /or email
    7·2 answers
  • Describe some advantages of a 64-bit versus 32-bit version of windows.
    9·1 answer
  • Why are the keys on the qwerty keyboard arranged the way they are?
    11·1 answer
  • Explain what middleware is. Name a common middleware in two-tier client/server architecture for database applications.
    10·1 answer
  • Write a program that lets a maker of chips and salsa keep track of sales for five different types of salsa: mild, medium, sweet,
    14·1 answer
  • Please help I have errors codes and don’t know that they are.<br> Please help thank You.
    6·2 answers
  • Mention five importance of taskbar​
    7·1 answer
  • O How basic blocks are identified and how the blocks are used to construct control flow graphs
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!