Answer: the line numbers are different on mine, but these were correct
Explanation:
Following are the description on the three-line code:
In the first line, a dictionary "games" is declared that holds "key and value" in it.In the key, it holds an integer value, and in the value, it holds a string value.In the second line, the append method is declared that adds value to the dictionary.In the third line, it holds a value of 12.Please find the attached file for the code.
Learn more:
brainly.com/question/20250851
plz hurry i'm timed Which type of essay presents one side of an argument to convince readers to support it?
a descriptive essay
an expository essay
a narrative essay
a persuasive essay
Answer:
persuasive
Explanation:
What is a database management program?
Explanation:
A database management program (DBMS) is a software package design designed to manipulate, define, retrieve, and manage data in database.
A DBMS generally manipulates the data itself, the the data format, field names, record structure and file structure.
(This is for photography segment exam btw)
Who created the first known photograph?
A. George Eastman
B. Ansel Adams
C. Joseph Niepce
D. Louis Daguerre
Answer:
C. Joseph Niepce
Explanation:
How is a value list created?
by the user typing in values for the list
by the list pulling values from another table
by the list pulling values from the same table
by the user linking the list to another database
Answer:
A
Explanation:
edge
Which feature in PowerPoint is used to correct common capitalization and text formatting issues but can also be modified for more robust and personalized corrections?
Grammar Checker
Insights
Spelling Checker
AutoCorrect
Answer:
AutoCorrect: D on edge
Explanation:
Answer:
D.AutoCorrect
Explanation:
a software function that automatically makes or suggests corrections for mistakes in spelling or grammar made while typing.: a computer feature that attempts to correct the spelling of a word as the user types it The iPad boasts an autocorrect system that will try to figure out what you mean to type even when you don't quite tap the right keys.
Type the correct answer in the box. Spell all words correctly.
What does Clara create that programmers can use to write code?
Clara works in a software development company. Her boss identifies that she has strong problem-solving skills. Clara’s boss places her on the planning team to create____ for programmers.
This is for Edmentum final! thanks
Answer:
design documents
Explanation:
Usually, in a software development company or information technology (IT) department, software is developed through a team effort. Such teams have programmers and various other professionals, such as software developers and engineers. These professionals perform parts of the entire software development process. For example, the programmer is not the only person in a team who can formulate a solution to a problem. Many times, software developers and system analysts do this. They create design documents for the programmer to follow. Based on these design documents, a programmer writes the code for the program.
Dora has inserted a text box into a Word document that she is formatting. Which strategy will not format text boxes? Create a link between two text boxes. Set the height and width of the text box. Add background images to the text box. Link the text box to another document.
Answer:
D. Link the text box to another document.
Explanation:
A text box is an object that you may add to your page that allows you to place and enter text wherever in it. The correct option is D.
What is a text box?A text box is an object that you may add to your page that allows you to place and enter text wherever in it. Content boxes may be handy for attracting attention to a certain text and also for moving text about in your document.
Dora has inserted a text box into a Word document that she is formatting. Therefore, the strategy that will not format text boxes is strategy will not format text boxes.
Hence, the correct option is D.
Learn more about Text Box:
https://brainly.com/question/13812028
#SPJ2
What is the missing line of code?
class vehicle:
self.model = strModel
self.color = strColor
def __str__(self):
return self.model + ' ' + self.color
Answer:
def__init__(self,strModel,strColor):
The missing line of the given code is as follows:
Class vehicle: def__init__(self,str Model,str Color). What is the significance of programming code?The significance of programming code may be determined by the fact that it implies a computer finishing the commands that are given by the user over and over again. As a result of this, people do not have to do the task repeatedly.
When it comes to using string commands in python, the sequence of characters inside either single quotes, double quotes, or triple quotes leads to their assignment to a variable. This variable more frequently relies on the instruction given by the user in a specific period of time.
Therefore, the missing line of the given code is well mentioned above with respect to python and code programming.
To learn more about Python programming, refer to the link:
https://brainly.com/question/26497128
#SPJ3
How many bit make a byte .
Answer:
It is easy .8 bits.You have to note this
Answer: 8
1 byte = 8 bit
What social media profession entails determining how and in what way an organization will create and maintain a social media presence?
social media strategist
social media marketer
social media manager
social media specialist
Answer:
i believe the answer is b.
Explanation:
Answer:
(a) strategist
Explanation:
its the proven answer on my test
Your friend told you that your favorite celebrity couple split. What is the best media form to use?
a
Wiki
b
Social Network
c
Infotainment site
d
Forum
Answer:
b
Explanation:
I think social network is the first source of every update of reality even wiki gets info from social network
Answer:a)wiki
kalo salah maaf ya
The number of binary digits required to count 10010 is called _________
What is the purpose of the Lookup Wizard?
to create a yes/no field quickly
to reference data from another table
to combine more than one field in a table
to generate a random number automatically
Answer:
The answer is B. To reference data from another table
Explanation:
I just got it right in Edg
Which of the components of the box model is transparent and does not take a background color? content padding border margin
Answer:
the answer is
ও d- margin
Explanation:
⁂ just did the cumulative exam review, hope this helped ☺
Margin is the component of the box model which is transparent and does not take a background color. Thus, the correct option is D.
What is background color?
The background color is, in most of the cases, displayed in the form of an RGB triplet or a hexadecimal code of colors. The three separate pairs of different numbers which are given in the command, represent the different set of color values of the RGB spectrum. The first value in this set stands for the red color, the second color stands for the green color and the last one stands for the blue color.
The background style of the content, padding, and border areas of a box model are specified by the background property of the generating element of the system. Margin backgrounds are the elements which are always transparent in color.
Therefore, the correct option is D.
Learn more about Background color here:
https://brainly.com/question/14928554
#SPJ2
if your tired but still need to proofread your document,what should you do?
proof read it anyway
scan through it quickly
submit your work as is
walk away and come back later
Answer:
If i were to choose one i would, come back to it later. But the best thing to do is have somebody else proofread your essay, doc, or anything else, because its the best thing to have a second pair of eyes so they can suggest what you could fix or change or any opinions on your document. Not sure why you need this but i hope it helps <3
Have a great day <33 -Blazetoxic123
Answer:
A
Explanation:
With _________, users will receive recommendations for items liked by similar users.
Answer:
Collaborative filtering
Explanation:
Collaborative filtering is an algorithms family in which there are various ways to determine the same users or items also there are various ways to determine the rating depending upon the same users rating
Therefore as per the given situation, the above is the answer
Hence, the same is to be considered
Provide an example by creating a short story or explanation of an instance where availability would be broken.
Incomplete/Incorrect question:
Provide an example by creating a short story or explanation of an instance where confidentiality would be broken.
Explanation:
Note, the term confidentiality refers to a state or relationship between two parties in which private information is kept secret and not disclosed by those who are part of that relationship. Confidentiality is broken when this restricted information is disclosed to others without the consent of others.
For instance, a Doctor begins to share the health information of a patient (eg a popular celebrity, etc) with others such as his family members and friend
s without the consent of the celebrity.
What are movies filmed before 1990's?
Answer: Once Upon a Time in the West (1968) PG-13 | 165 min | Western. ...
Cinema Paradiso (1988) R | 155 min | Drama. ...
Blade Runner (1982) R | 117 min | Action, Sci-Fi, Thriller. ...
2001: A Space Odyssey (1968) G | 149 min | Adventure, Sci-Fi. ...
Apocalypse Now (1979) ...
Chinatown (1974) ...
Stardust Memories (1980) ...
Le Notti Bianche (1957)
Explanation:
aquatic life zone such as acorans and their bays, estuaries, coastal wetlands, shorelines, coral reffs and mangrove forests?
Answer:
Iajajkwbwiw whw
Explanation:
Bshsiwiqnqiaowpwownsbbsdk akakwjnwkwnwkwnwoqknanamamalamkakakskwkwkwnwmw.
I hope u liked my answer. Thank u
Which file is usually the first file to be displayed when you navigate to a website?
A. Starter.html
B. Home.html
C.index.html
D. Template.html
what is not a type of application software
this is very simple i just need someone to type out this for me
Answer:
#27
2i , -2i, i, -i i^2 = -1
1(x - 2i)(x + 2i) 1(x-i)(x+i)
x^2 +2x-2x -4.2i x^2 -xi-xi -i
(x^2 + 4) x^4 + 1
x^2 +x^2 +11x
x^4 +5x^2 +4
+4+2+2+-1
*This was not simple for me
First time using this site so be mindful if I make any mistakes
For Micro Econ AP I am having a problem with this one question
It goes:
In what ways do households dispose of their income? How is it possible for a family's persoal consumption expenditures to exceed its after-tax income?
Answer:
Okay... Well
I will. help you out dear
How can you place a paragraph of text in a box smaller than the text content, and add a scroll bar?
You can do this by using the __ property and setting it to ___.
(First blank: Border, Margin, Overflow.)
(Second Blank: Auto, hidden, scroll)
Answer:
I think it's overflow and hidden.
Explanation:
Answer:
You can do this by using the overflow property and setting it to hidden .
Explanation:
You receive an email from your school's head of IT. There is a concern for a potential hack to the school's servers. IT knows some accounts have been compromised, with their login and passwords overwritten by the hackers. They need to reset the accounts that the hackers have changed the passwords on. However, they don't have access to the passwords directly, and the change records were corrupted by the attack. They need students and staff to confirm their passwords by logging into a secure site. If the login fails, they'll know your account was compromised and reset your account immediately.
a.) This could be a phishing attempt. If the situation is as described in the email, this is also serious, but the method suggested is the same methods used by social hackers. Look up your IT Departments phone number and call them about the email.
b.) This is a serious issue, and the email came from the head of IT. The site also shows that it's secure. The longer it takes to reset accounts, the longer the hackers will have access to your account. Follow the instructions in the email from the head of IT.
Answer:
a.) This could be a phishing attempt. If the situation is as described in the email, this is also serious, but the method suggested is the same methods used by social hackers. Look up your IT Departments; phone number and call them about the email.
Explanation:
This makes sense because many people do these types of scams to trick people into logging into their accounts and actually hack them from there, I actually got an email like this last week to my iCloud address. Make sure that the email actually came from the IT department by checking the domain the email comes from, and call the IT department to make sure.
Hope this helps!
If a computer company develops a touchscreen tablet with the intent that it will have to be replaced within two years by the consumer, this is known as which of the following? consumer fraud supply and demand planned obsolescence innovative commerce
Answer:
b
Explanation:
demand planned obsolescence
The image below shows an encoding for a black and white pixel image. The first two
bytes of the data (circled in red) are used to encode the width and height of the
image. What is the best term for this type of "data about the data"? Explain why it is
necessary to include this data in the encoding.
Answer:
where is the image i need the image
Explanation:
Information stored on CD-ROM disc must be read and then erased.True or false?
Answer:
False
Explanation:
What is bill Gates passion?
tO CrEaTe ToiLeT. Sorry, the real answer is to change the world via technology, and to keep on innovating.
I hope this helps, and Happy Holidays! :)
What is the next line?
tupleA = (5, 20, 30, 40, 30)
tupleA.index(40)
The next line is
Answer:3
Explanation: it’s 3
Answer:
3
Explanation: