Answer:
6%($1,200) 0.06($1,200) 3/50($1,200)
Explanation:
hope this helps sorry if i am wrong
have a nice day
Answer:
a,c,e
Explanation:
it just makes sense U^U
the contents in cells are A1 through A6 are 6,3,4,7,9 and 7. What function would return the answer 6?
Answer:
The formula =AVERAGE(A1:A6) would return the average of those numbers which is '6'.
Explanation:
The content in cells is A1 through A6 are 6,3,4,7,9 and 7.As the average of 6,3,4,7,9 and 7 is 6.
If the range A1:A6 contains numbers, the formula =AVERAGE(A1:A6) would return the average of those numbers.
Therefore, the formula =AVERAGE(A1:A6) would return the average of those numbers which is '6'.
Please help.
Why I'm I getting a syntax error.
In python, the word list is a keyword. It's not meant to be used for a variable. Try changing list to lst. There also might be other parts wrong with your code. If we could take a look at your whole function, we could determine if there is anything else wrong with your code.
what format can be applied to text in excel?
You can apply accounting format,date,numbers, currency, percentage or even fraction
50 PTS
in Java
Write a program with a method called passwordCheck to return if the string is a valid password. The method should have the signature shown in the starter code.
The password must be at least 8 characters long and may only consist of letters and digits. To pass the autograder, you will need to print the boolean return value from the passwordCheck method.
Hint: Consider creating a String that contains all the letters in the alphabet and a String that contains all digits. If the password has a character that isn’t in one of those Strings, then it’s an illegitimate password!
import java.util.Scanner;
public class JavaApplication46 {
public static boolean passwordCheck(String pass){
String alphanum = "abcdefghijklmnopqrstuvwxyz1234567890";
boolean legit = true;
if (pass.length()>= 8){
for(int i = 0; i < pass.length(); i++){
if (alphanum.indexOf(pass.charAt(i)) != -1 && legit != false){
legit = true;
}
else{
legit = false;
}
}
}
else{
legit = false;
}
return legit;
}
public static void main(String[] args) {
Scanner scan = new Scanner(System.in);
System.out.print("Enter a password: ");
String password = scan.next();
System.out.println(passwordCheck(password));
}
}
I hope this helps!
Any application that wants to be displayed on the web must use the HTTP protocol
True
False
Answer:
true
Explanation:
The Quick Access tool bar allows you to customize the actions or commands you frequently use.
True
False
CSS is a language that controls the way content on a web site appears. It uses_______ _____to
change the look of a page.
Answer:
I'm not sure what the answers are, but when someone is making a website from scratch, they tend to use CSS HTML and JS(javascript)
hope i helped ;)
Why might be one reason a stock becomes more valuable over time?
A. The industry is growing
B. The company is well managed
C. There’s a lot of demand on the product
D. All of the above
Describe how each command is used by matching the command to its purpose.
removes data fror
places it on the cli
Paste
cancels a previou
Undo
restores a previou
Copy
duplicates data a
clipboard
Cut
Redo
places data in its
Answer:
The correct answer to this question is given below in the explanation section.
Explanation:
The correct command matches its use are given below:
Paste Places data in its
Undo Cancel a previous
Copy Duplicates data on the clipboard
Cut Removes data for places it on the clipboard
Redo restores a previous
Paste term is used when you are placing copied data. Undo is used to cancel a previous action performed while Redo is used to restores a previously performed action. The copy is used to duplicate data on the clipboard while Cut is used to removes data for places/ to paste somewhere else.
The ______ is designed to store audio data on computers and/or digital music players.
A. waveform
B. audio file format
C. sample rate
D. bandwidth
Answer:
audio file formats of computer
how to take a pic with a cumputer
Answer:
Ctrl+Shift+4
Explanation:
Answer:
Use Snip+Sketch on your taskbar
It looks like this~
HOW CAN A PERSON GET BENEFITTED BY THE ICT BASEDSERVICES PROVIDED BY GOVERNMENT
Answer:
Explanation:
It aims to transform the entire ecosystem of public services through the use of information technology.ICT holds particular promise in areas of governance and public participation. Age can use information to reduce corruption and increase government transparency, accountability, efficiency and so finally gud night guys and take care.
plz mark as brainliest
Which kind of a person will you be if you prove to be accountable for your actions?
Answer: You would be a person of integrity.
Explanation: Look up Integrity for details.
. Write a Python command to assign the value 80.35 to a variable called 'point'.
Answer:
point=80.35
Explanation:
ABC IF U HAVE A LEGENDARY PET ON ADOPT ME OR ANYTHING COOL!! <3
Answer:
ABC PLEASE
Explanation:
Answer:
ABC i have mega owl and neon cow and mega frost <3
Justify the use of an e-diary in the organisation of the meeting.
Answer:
It can be used to easily organize stuff
Explanation: It can be easily used to organize meetings & write important stuff, and you will also never run out of pages, which is better than having no diary.
While an image is still being editing, it is best to save it as a PDF. Group of answer choices True False
Answer:
f
Explanation:
You have to match the letter nexts to the numbers
Answer:
Word is for business letter 4+a
2+c Monthly budget expenses
3+b is for presentation
1+d department store inventory
Select the correct answer from the drop-down menu.
Chrissie shirks the additional work given to her.
She lacks the trait of
Answer:
Responsibility
Explanation:
Which entity might hire a Computer Systems Analyst to help it catch criminals?
a law enforcement agency controlled by the government
a private investigator who used to work for the government
a credit card company that does business with the government
a financial management firm with ties to the government
Answer:
The correct answer to this question is given below in the explanation section.
Explanation:
The correct answer to this question is:
A law enforcement agency controlled by the government might hire a Computer System Analyst to help it catch criminals.
Because only law enforcement agency that is under control of government allows in any country to catch criminals. So, in this context the first option is correct.
While other options are not correct because:
A private investigator who used to work for the government does not need the services of a computer system analyst, because he may be assigned only one assignment. And, his purpose is to perform duty and complete the assignment. A credit company also does not allow the Government in any country to catch the criminal. A financial management firm also not allowed to catch the criminal, so in this context, only a law enforcement agency controlled by the government is allowed to catch the criminal. So, the first option of this question "a law enforcement agency controlled by the government" is correct.
Answer:
A
Explanation:
What are the characteristics of calendar sharing options in Outlook 2016? Check all that apply.
Answer:
a,b,c,e
Explanation:
Answer:
Quit your bickering in the replies on the other answer, this is correct.
Explanation:
Who you think is better? Ninja or TFue ,btw do you know who icebear is?
Answer:
no, no i dont think i will.
Explanation:
where to buy a ps5
I really want one please help meh
Answer:
You can buy one at gamestop, target, walmart, best buy and probably more stores
Answer:
Amazon, walmart, target, gamestop?
Explanation:
I'm sure a quick go ogle search will get u what u want to see, have a nice day and I hope u get what u want!
I need help pleaseeee
Answer:
The Answer is C. Hope you get it right, Good Luck!!!
Answer:
The answer is B
Explanation:
To create a list, paragraph, or unordered list, you should use HTML code, whereas in CSS coding, you can change the overall font size of a tag using the font-size=(number) tag.
Plagiarism occurs when writers
use others’ ideas and writing as their own.
exclude a bibliography from their work.
include direct quotations from others.
use others’ work as inspiration.
Answer:
A- Use others' ideas and writing as their ownExplaniation:
it's plagiarism, just don't take other people's work and pass it as your own. smh lol
Answer:
Just so I don't get reported for copying I will tell all the answers that are not right.
Explanation:
B.
C.
D.
Hope this helps.
Which best describes what a works-cited list includes?
sources found during research
sources cited in a paper
sources quoted in a paper
sources examined during research
Answer: Sources cited in a paper
Explanation:
Answer:
B
Explanation:
where can you apply the hand wire splicing technique
Answer:
When you want to extend an electrical wire for an apparatus, e.g., a lamp or a speaker.
Which component in a CPU is responsible for transferring
data from one functional component to another?
¿En cuales situaciones concretas se puede aplicar las técnicas de conteo(particularmente las permutuaciones y las combinaciones) dentro de la informática?
Answer:
In which specific situations can counting techniques (particularly permutuations and combinations) be applied within computer science? for anybody trying to help
A collection of computers, printers, routers, switches, and other devices
that can communicate with each other over some transmission medium
O network
O host part
subnet part
subnet
ermano envia foto de lo que necesitas yo te ayudo