1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
laila [671]
2 years ago
14

Q) Look at the code and determine the output

Computers and Technology
1 answer:
lutik1710 [3]2 years ago
6 0

Answer:

B.

Explanation:

You might be interested in
The function below takes a single argument: data_list, a list containing a mix of strings and numbers. The function tries to use
Doss [256]

Answer:

def filter_strings(data_list):

   string_list = []

   for s in data_list:

       if type(s) == str and len(s) > 5:

           string_list.append(s)

   return string_list

Explanation:

Create a function called filter_strings that takes data_list as a parameter

Initialize a new list to hold the strings that are longer than 5 characters

Initialize a for loop that iterates through the data_list

Check the elements if they are string - use type function, and if their length is greater than 5 - use len function. If an element satisfies the both conditions, put it to the string_list

When the loop is done, return the string_list

6 0
3 years ago
Wendy had been searching the internet for a great deal on jewelry. While looking at one site, a pop-up was displayed that told h
tigry1 [53]

Answer:

boot the computer from the windows installation disk and run startup repair

Explanation:

Based on the scenario being described within the question it can be said that the best option in this situation would be to boot the computer from the windows installation disk and run startup repair. This will analyze all windows files and clean up any files or malicious software that does not belong in order for the system to be able to correctly boot into the operating system. Then from inside the operating system you can run a full diagnostic of the system.

4 0
3 years ago
Can u please help me solve this
azamat

Alice has twice as many pencils as Cara. Leon has three more pencils than Alice. The three children have a total of 58 pencils.

<h3>What are the no. of pencils?</h3>

The no. of pencils are there totally as the 11.

Read more about the basic maths:

brainly.com/question/19493296

#SPJ1

4 0
2 years ago
How we Design a power point presentation with your own voice recording in slide show with at least 10 slides. You can choose any
sukhopar [10]

Answer:

qszdsdddddsq

Explanation:sqdqsdsqdsqd

6 0
3 years ago
Install hardware, install software, and convert data are the three steps found in the _____. Select one:
aev [14]

Answer:b)Conversion plan.

Explanation:Conversion plan is type of plan in which the the technique is followed by converting the data from the present system to another system's hardware and software surroundings.

The technique follows three basic steps in the conversion plan is software installation plan, hardware installation plan and conversion of data. Thus the correct option is option(b).

3 0
4 years ago
Other questions:
  • Is a program that allows you to view images and animations, listen to audio, and watch video files on your computer or mobile de
    11·1 answer
  • Your boss asks you to transmit a small file that includes sensitive personnel data to a server on the network. the server is run
    6·1 answer
  • 6. Which of the following is malware? (1 point)
    10·2 answers
  • Write a program that prompts the user to enter integers in the range 1 to 50 and counts the occurrences of each integer. The pro
    13·1 answer
  • The ___ value is the number of time units a programmed timer is programmed to count before timed contacts change state.
    8·1 answer
  • A non technical kind of cyber intrusion that relies heavily on human interaction and often involve tricking people into breaking
    5·1 answer
  • Community gardens are public gardens where local residents can grow plants in a plot. They are very popular, so there are often
    7·1 answer
  • Ba esti prost?<br> Ba esti nebun?<br> Ce ai?
    5·2 answers
  • How does having weak security on your browser represent the weakest link in a network
    8·1 answer
  • 1. Define the term Intranet.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!