Answer:
See the code below.
Explanation:
def sumOfTwo(a, b, v):
output = False
for i in a:
for j in b:
sum = i + j
if sum == v:
output = True
print(output)
sumOfTwo([-4, 6, 1], [10, .5, 30], 6)
You can use any online python ide to check the code.
What does a theme contain?
A theme is a set of colors, fonts, effects, and more that can be applied to your entire presentation to give it a consistent, professional look.
Answer:
It's just the lesson the author wants you to get. The moral of the story!!
Explanation:
Match the items with their respective descriptions.
defining focus
visual balance
color harmonies
screen design principles
helps make visually attractive and
functional web page
helps with color combinations in a
>
web page
helps scan for Information quickly in a
web page
>
helps provide visually pleasing screen
arrangement in a web page
>
Defining focus helps scan for Information quickly in a web page.
Visual balance helps make visually attractive and functional web pageColor harmonies helps with color combinations in a web pageScreen design principles helps provide visually pleasing screenarrangement in a web page.What is Defining focus?This is known to be a form of good screen design that can help on to highlight important areas to which one can focus on when looking for information.
Note that this form of guidance helps a person to scan for information very fast . Without having a clear focal points, you have to work a lot on the the entire web page.
Learn more about Defining focus from
https://brainly.com/question/7284179
Can anyone help me on assignment 8: personal organizer on edhesive?
Open the PDF attached and it has the code I used to answer it. It got me 100%. Hope it works for you <3
Isabella is a network engineer. She would like to strengthen the security of her organization's networks by adding more requirements before allowing a device to connect to a network. She plans to add authentication to the wireless network and posture checking to the wired network. What technology should Isabella use
The technology that Isabella should use to strengthen the security of her organization's networks is Network access control (NAC).
What is Network access control (NAC)?Network access control (NAC), is popularly known to be network admission control. This is said to be a kind of process that is known for hindering unauthorized users and devices from having any kind of access to any private network.
Note that the use of this Network access control (NAC) can help Isabella should to strengthen the security of her organization's networks.
Learn more about network engineer from
https://brainly.com/question/26563535
What do you understand by memory word?
Answer:
Explanation:
a 5-bit memory in which the individual memory bits are content5_4 , content5_3 , content5_2 , content5_1 , and content5_0
Question 5 of 10
When gathering information, which of the following tasks might you need to
perform?
O A. Apply standards, such as measures of quality, beauty, usefulness,
or ethics
B. Fill out forms, follow procedures, and apply math and science
C. Study objects, conduct tests, research written materials, and ask
questions
D. Seek out ideas from others and share your own ideas
Answer:
The answer is ( D ) I hope this answers your question
a customer willl borrow
Answer: C. the PC
Explanation: The motherboard is not included in the passage
the ability to collaborate with others on online documents is made possible through technologies collectively known as web 2.0 true or false
The ability to collaborate with others on online documents is made possible through technologies collectively known as web 2.0 is known as a true statement.
What is the meaning of online document?“E-document” is a term that is used for any online document. It refers to to any form of transactional document that is often exchanged between trading partners in form of an electronic format and manner.
Note that the strength to be able to work with others on online documents can be made possible via technologies that are said to be known as web 2.0.
Learn more about online documents from
https://brainly.com/question/13171394
Answer:
True
Explanation:
Just because
C-13 You just got a call from the University system administrator, who says that either you or your roommate is issuing denial-of-service attacks against other students from your shared network segment. You know you are not doing this, but you are unsure about your roommate. How can you tell if this accusation is true or not
Answer:
take a subtle aproach
Explanation:
What device allows data to be processed into information
Anyone know an "unblocked" alternative of giggl, or hyperbeam, maybe discord for a school chromebook while i wait during class since i'm literally finished with everything, or can you tell me how to unblock things on the chromebook.
You can get a VPN via the place where you get on your browser. Any VPN with at least a 4.2-star rating should do the trick. If you are on chrome, I'd recommend Adguard VPN. You can create an account for free.
All data and bookman accounts will now start to be deleted from your Chromebook. You can now use your Chromebook without any limitations once you've finished.
What are the ways to unblock things on the Chromebooks?This makes sure that neither other users nor unauthorized individuals may access your data by removing the Chromebook's hard drive and reading it. A Chromebook's “owner” is the first person to log in, and they have the option to control who else is permitted to log in if they so decide.
A VPN can be obtained from the same location where you download your browser. Any VPN with at least a 4.2-star rating should do the trick. If you are on chrome, I'd recommend AdGuard VPN. You can create an account for free.
Therefore, On your Chromebook, it is not possible to transfer owner permissions to another account.
Learn more about Chromebook here:
https://brainly.com/question/23567863
#SPJ5
1 tasis = ["Maths homework", "English homework
"Practise music", "Tidy up room")
What would the program outout de if the lines below were added to it?
4 print tas)
Answer:
65
Explanation:
[C Pointer] Not all arithmetic operations may be performed on pointers. For example, you cannot ________ or _______ a pointer.
It is not all arithmetic operations may be performed on pointers. For example, you cannot multiply or divide a pointer.
What arithmetic operations cannot be done on pointers?We cannot carry out all type of arithmetic operations with the use of the pointers.
Note that the Pointer arithmetic is said to be a little bit different from arithmetic we normally use and as such, the only used arithmetic operations applicable on pointers are known to be the addition of numbers.
Learn more about arithmetic operations from
https://brainly.com/question/4721701
Can anyone figure this out???? I need help ASAP!
Answer:
cant see
Explanation:
what is the answer in online learning and digitalcitizenship
Answer: an online encyclopedia.
Explanation: encyclopedias often have constantly updated pieces of news, that are also accompanied by fact-checkers as well unlike newspapers.
Which file in linux would i need to modify in order for a local user to connect to a new site i created by just entering the site name in the browser
I attached my answer because Brainly wouldn't let me post it. It is important to be detailed since you are setting up a DNS server to do this.
In Scratch, what term refers to a message that gets passed along and causes an action to happen?
broadcast
mechanical
trigger
variability
Answer:
Broadcast
In scratch, let's use a block and a message as our example, when I receive and broadcast.
So you would put your syntax like this,
When green flag clicked
broadcast message1
When I receive message1
say Hello World!
Answer:
your answer is A. Broad cast
Explanation:
In your opinion what is the best or greatest technology advancement in your lifetime and why?
At least 6 sentences and include a topic sentence and conclusion sentence. Provide an example in the paragraph to support your opinion. No need to site
Answer:
ELECTRICITY
Since early discoverers like Benjamin Franklin studied it, and inventors like Nikola Tesla tested ways to turn it into power, electricity has not only been fueling generations of new innovations but also become an irreplaceable tool of modern life.
Explanation:
There's an old joke about a group of friends debating the world's greatest invention:
There's an old joke about a group of friends debating the world's greatest invention:"The greatest invention of all time is the Thermos bottle," one man says.
There's an old joke about a group of friends debating the world's greatest invention:"The greatest invention of all time is the Thermos bottle," one man says."Why is that?" one of his friends asks.
There's an old joke about a group of friends debating the world's greatest invention:"The greatest invention of all time is the Thermos bottle," one man says."Why is that?" one of his friends asks."Well," says the man, "when you put something hot in it, it stays hot. And when you put something cold in it, it stays cold."
There's an old joke about a group of friends debating the world's greatest invention:"The greatest invention of all time is the Thermos bottle," one man says."Why is that?" one of his friends asks."Well," says the man, "when you put something hot in it, it stays hot. And when you put something cold in it, it stays cold.""Yeah," says the friend, "so what?"
There's an old joke about a group of friends debating the world's greatest invention:"The greatest invention of all time is the Thermos bottle," one man says."Why is that?" one of his friends asks."Well," says the man, "when you put something hot in it, it stays hot. And when you put something cold in it, it stays cold.""Yeah," says the friend, "so what?""Think about it, " says the man. "That little bottle -- how does it know? but have you ever think how
Thermos bottle made.
yeah, because of electricity....
The discovery of electricity became the necessary basis for the occurrence of multiple other sciences and inventions that are constantly used and are of crucial meaning in the contemporary world.
The modern society, its life and well being depends on electricity wholly. We cannot imagine our lives without cell phones, computers, the internet, coffee makers, toasters, washing machines, and microwave ovens, and all of these devices work due to electricity, but we often forget that more crucial needs of ours are fulfilled.
:-befrank
In what way. If any, does click-lacking differ from cross-site scripting?
Answer:
In cross-site request forgeries, the user's web browser acts as the confused deputy, where as in clickjacking, the user is the confused deputy.
Explanation:
Select the four types of project shut down that depend on the needs of the project and the state of the organization. termination by starvation termination by addition termination by oblivation termination by extinction termination by division termination by integration termination by incorporation
Answer:
termination by addition, termination by integration, termination by extinction, termination by starvation
Explanation:
Answer:
Termination by integration
Termination by addition
Termination by extinction
Termination by starvation
Explanation:
Termination by extinction occurs when is stopped. The project may have been stopped because it was completed, no longer needed, or if there was a major change that required it to stop.
Termination by addition is when the entire task outlined in the project is completed and transferred to another part of the organization.
Termination by integration occurs when different aspects of the project are reassigned to the existing departments. The project personnel will often return to their regular positions. The projects workings are broken up and redistributed, and this process will typically be slow.
Termination by starvation comes to an end, and it can be shut down by eliminating project personnel and actions in phases. When the initial stages of the project are complete, these project members may no longer be needed, so then they are let go.
To use Aggregate functions on subgroups within the total result set, place the Aggregate function in the Select clause and add the ____ ____ clause to the query. (two words)
To use Aggregate functions on subgroups within the total result set, place the Aggregate function in the Select clause and add the Group By clause to the query.
What is an aggregate function?An aggregate function is known to be a tool that functions only by calculating one or more values and then it also returns a single value.
Conclusively, The aggregate function is a tool that is often employed with the GROUP BY clause and HAVING clause of the SELECT words.
Learn more about Aggregate functions from
https://brainly.com/question/15875528
im a beginner programmer. what languages should i learn and how do i get better
Answer: Python, Coding, JavaScript and there's more out there but it's been a while since I have taken Tech classes in a while!
Explanation: I recommend you use typing.com and code.org for coding! I don't know how else to answer this question but this was all I could say!
According to the mil-std-6016 what are the requirements for information to be passed between and among joint forces and organizations, along with the technical interfaces, and protocols called
Based on mil-std-6016, the requirements for information to be passed between and among joint forces, along with the technical interfaces is called Joint Tactical Operations (JTO) Procedural Handbook.
What is Joint Tactical Operations (JTO) Procedural Handbook?This is known to be a book that contains all the provisions that is needed by system operators along with some technical parameters and tactical procedures.
It is often used for the exchange of near real-time data through TDL and it is known to be set up to function on console in the time of joint service operations and exercises.
Learn more about military from
https://brainly.com/question/525279
When trying to find a machine that is needed to access the data can be difficult. What is this an example of?.
There are different kinds of computer language. The above is an example of Machine language. It is also a kind of input devices.
Why machine language?Machine language is known to be a type of language that can only be understood by a computer. It is therefore very difficult for a person to understand as it is the only thing that the computer system can use.
When a person is trying to find a machine that is needed to access the data, it will be be difficult as one is not familiar with the machine language and what can be the best tool to use.
Learn more about Machine language from
https://brainly.com/question/5045657
100 POINTS!!!!
Select 3 examples of netiquette guidelines.
.Follow the same standards online as you would in real life.
Always write in all caps to ensure messages are understood.
Deceive, steal, and defraud online when the opportunity arises.
Respect other people’s data and time limitations.
Share accurate and helpful information over the internet.
The examples of netiquette guidelines are:
Follow the same standards online as you would in real life.Respect other people’s data and time limitations.Share accurate and helpful information over the internet.What is netiquette guidelines?The term netiquette is known to be the short form of Internet etiquette or network etiquette.
Conclusively, They are known to be the different guidelines for accurate and right communication se in the online community. It is made up of the right ways for sending e-mail, making conversations online, and others.
Learn more about netiquette guidelines from
https://brainly.com/question/3493104
Can someone answer this question please because i didn't understand.
Name the icon you use on your graphical user interface the least. Explain why you rarel use it.
Answer:
Read below
Explanation:
Your graphical user interface is essentially your home screen on your phone or computer. You interact with the icons of apps on your phone. This question is worded kind of weird, but I would assume that you would just pick the app you use the least and explain why.
By ___, browser cookies can improve a user's online experience.
A. keeping track of data
B. organizing photos
O C. blocking malware
O D. enabling networking
By keeping track of data, browser cookies can improve a user's online experience. So, option A. is the right choice.
By keeping track of data, browser cookies can improve a user's online experience. When a user visits a website, the website may store a small text file, called a cookie, on the user's device. These cookies contain information about the user's preferences, login status, browsing history, and ther relevant data.
Step 1: When a user visits a website, the website sends a cookie to the user's browser.Step 2: The browser stores the cookie on the user's device.Step 3: The next time the user visits the same website, the browser sends the stored cookie back to the website.Step 4: The website uses the information in the cookie to personalize the user's experience, such as remembering their login credentials, displaying customized content, or providing relevant recommendations based on their previous interactions.By keeping track of data through cookies, websites can enhance the user experience by offering personalized content, saving preferences, and improving navigation. This helps users save time and have a more tailored online experience.
The right answer is option A. keeping track of data
For more such question on cookies
https://brainly.com/question/14252552
#SPJ8
What kind of company would hire an Information Support and Service employee?
O software development
O computer repair
O website development
O network administration
Answer:
B. Computer Repair
Explanation:
I got it right on edge. trust.
Answer: B Computer repair
Explanation:
I did the unit test on EDG 100% sure that's the answer
Where was the oldest national broadcasting network in the world founded?.
Answer:
Headquartered at Broadcasting House in London.
Explanation:
Gary was browsing through a programming website currently on prog. Edu/homepage. Html. There were few related links on the page. He clicked on a link that had the term "Learn Testing. " This link led him a website called learntotest. Edu/learntesthome. Html. Which is the entry page in this
case?
A. Learntotest. Edu/learntesthome. Html
Ð. Learntotest. Edu
C. Prog. Edu/homepage. Html
D. Prog. Edu
The entry page in this scenario above for Gary is Learntotest. Edu/learntesthome. Html.
What is HTML?HTML is known as HyperText Markup Language. This is said to be a kind of code that is often written and used to make standard a web page and all of its content.
Conclusively, Note that all HTML documents often begins with a document type declaration such as : <!DOCTYPE html> as in the case above
Learn more about HTML from
https://brainly.com/question/4056554