1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nutka1998 [239]
2 years ago
11

Can someone reply me

Computers and Technology
1 answer:
Georgia [21]2 years ago
4 0
Yes how can i help you?
You might be interested in
We can include following item(s) during configuration itemidentification:
Ainat [17]

Answer:

d) All of the above

Explanation:

In configuration management, the Identify configuration items, work products and related components are present.

  • All the documents which are related to the work,the manuals how that the system works are present in the configuration item identification.
  • The source code that is implement for the functioning of the products.These are implemented at the time of generation of products.
  • Software Requirement Specifications are also specified by SRS it is present in design stage of software development life cycle,it is also a part of configuration item identification.
5 0
3 years ago
Write a function called printRange() that accepts two integers as arguments and prints the sequence of numbers between the two a
a_sh-v [17]

Answer:

def printRange(start, stop, steps = 1):

   list1 = []

   if steps > start or stop:

       print("Steps is larger than start and stop value")

       return None

   if int(start) < int(stop):

       while start < stop:

           start = start + int(steps)

           list1.append(start)

       print(list1)

   elif start > stop:

       while start > stop:

           stop = stop + int(steps)

           list1.append(stop)

       print(list1)

   elif start == stop:

       print(start)

   else:

       print("Values are not integers.")

for easier viewing:

https://www.codepile.net/pile/e95verLk

If you need help understanding comment below.

5 0
1 year ago
Random access memory is the portion of a computer's primary storage that does not lose its contents when one switches off the po
brilliants [131]

Answer:

False

Explanation:

The RAM does lose its memory when you turn off the computer, unlike hard drive which is slower but keeps memory

4 0
2 years ago
Read 2 more answers
Why do relational databases use primary keys and foreign keys?.
Andrew [12]

Answer:

Explanation:

A relational database is designed to enforce the uniqueness of primary keys by allowing only one row with a given primary key value in a table. A foreign key is a column or a set of columns in a table whose values correspond to the values of the primary key in another table.

8 0
2 years ago
The following shared data structures must be declared as global variables such that they are shared by all threads
Elena L [17]

Answer:

what the heck

Explanation:

4 0
3 years ago
Other questions:
  • Which area of physics governs wireless communication?
    10·2 answers
  • The convergence of information technology and operations technology, offering the potential for tremendous improvements in effic
    14·1 answer
  • 3.3 Code Practice: Question 1
    15·1 answer
  • A strategic information system can be any kind of information system that uses information technology to help an organization __
    11·1 answer
  • Python
    6·1 answer
  • A social cause is: O A. when one person protests without the support of others. B. something that not many citizens think or car
    8·1 answer
  • Which is the correct expansion of the term Internet?
    15·2 answers
  • PACIFIC NORTHWEST
    10·1 answer
  • Which code will print a random number between 1 and 100?
    15·2 answers
  • Difference between switch and switch lite
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!