Answer:
It is answer.capitalize()
Explanation:
The missing line of code is:
>>> answer = "happy birthday"
>>> answer. Capitalize()
'Happy birthday'. The correct option is (C).
What do you mean by the line of code?Source lines of code (SLOC), also referred to as lines of code (LOC), is a software metric that counts the lines in the source code of a computer programme to determine the size of the programme.
Use cloc filename> to obtain the lines of code contained in a single file. To obtain the code lines in a straightforward Vue file, we are utilizing the command.
Furthermore, it acknowledged that it is a VueJS component. Using the cloc —by-file command, we may examine every line of code included in a file or directory.
Therefore, the missing line of code is:
>>> answer = "happy birthday"
>>> answer. Capitalize()
'Happy birthday'.
To know more about the line of code, visit:
https://brainly.com/question/18844544
#SPJ2
a.
Define a computer with its proper meaning.
Answer:
Computer
Explanation:
a programmable electronic device designed to accept data, perform prescribed mathematical and logical operations at high speed, and display the results of these operations.
Answer:
computer
Explanation:
An electronic machine that processes, stores data, and does calculations.
Justify the use of an e-diary in the organisation of the meeting.
Answer:
It can be used to easily organize stuff
Explanation: It can be easily used to organize meetings & write important stuff, and you will also never run out of pages, which is better than having no diary.
50 PTS
in Java
Write a program with a method called passwordCheck to return if the string is a valid password. The method should have the signature shown in the starter code.
The password must be at least 8 characters long and may only consist of letters and digits. To pass the autograder, you will need to print the boolean return value from the passwordCheck method.
Hint: Consider creating a String that contains all the letters in the alphabet and a String that contains all digits. If the password has a character that isn’t in one of those Strings, then it’s an illegitimate password!
import java.util.Scanner;
public class JavaApplication46 {
public static boolean passwordCheck(String pass){
String alphanum = "abcdefghijklmnopqrstuvwxyz1234567890";
boolean legit = true;
if (pass.length()>= 8){
for(int i = 0; i < pass.length(); i++){
if (alphanum.indexOf(pass.charAt(i)) != -1 && legit != false){
legit = true;
}
else{
legit = false;
}
}
}
else{
legit = false;
}
return legit;
}
public static void main(String[] args) {
Scanner scan = new Scanner(System.in);
System.out.print("Enter a password: ");
String password = scan.next();
System.out.println(passwordCheck(password));
}
}
I hope this helps!
HOW CAN A PERSON GET BENEFITTED BY THE ICT BASEDSERVICES PROVIDED BY GOVERNMENT
Answer:
Explanation:
It aims to transform the entire ecosystem of public services through the use of information technology.ICT holds particular promise in areas of governance and public participation. Age can use information to reduce corruption and increase government transparency, accountability, efficiency and so finally gud night guys and take care.
plz mark as brainliest
how to take a pic with a cumputer
Answer:
Ctrl+Shift+4
Explanation:
Answer:
Use Snip+Sketch on your taskbar
It looks like this~
Any application that wants to be displayed on the web must use the HTTP protocol
True
False
Answer:
true
Explanation:
Select the correct answer from the drop-down menu.
Chrissie shirks the additional work given to her.
She lacks the trait of
Answer:
Responsibility
Explanation:
Which component in a CPU is responsible for transferring
data from one functional component to another?
Which kind of a person will you be if you prove to be accountable for your actions?
Answer: You would be a person of integrity.
Explanation: Look up Integrity for details.
where can you apply the hand wire splicing technique
Answer:
When you want to extend an electrical wire for an apparatus, e.g., a lamp or a speaker.
While an image is still being editing, it is best to save it as a PDF. Group of answer choices True False
Answer:
f
Explanation:
Why might be one reason a stock becomes more valuable over time?
A. The industry is growing
B. The company is well managed
C. There’s a lot of demand on the product
D. All of the above
The meaning of docile can be determined by the... context clue. synonym atonym or explanation
Answer:
Synonym
Explanation:
I'm pretty sure it's either synonym or explanation, but if there isn't an explanation, it's almost always synonym... so... synonym is correct.
Answer:
it is explanation
Explanation:
trust me
CSS is a language that controls the way content on a web site appears. It uses_______ _____to
change the look of a page.
Answer:
I'm not sure what the answers are, but when someone is making a website from scratch, they tend to use CSS HTML and JS(javascript)
hope i helped ;)
Select all the lines that have a slope of 5/2
Answer:
Add a picture, then ask the question again.
You have to match the letter nexts to the numbers
Answer:
Word is for business letter 4+a
2+c Monthly budget expenses
3+b is for presentation
1+d department store inventory
A collection of computers, printers, routers, switches, and other devices
that can communicate with each other over some transmission medium
O network
O host part
subnet part
subnet
ermano envia foto de lo que necesitas yo te ayudo
The ______ is designed to store audio data on computers and/or digital music players.
A. waveform
B. audio file format
C. sample rate
D. bandwidth
Answer:
audio file formats of computer
Order the steps for accessing the junk email options in Outlook 2016
Select Junk Email Options
Click the Junk button
Select a message
Choose one of the protection levels
Locate the Delete group on the ribbon
Answer:
To access the the junk email options in Outlook 2016, follow the following steps.
1. Click the Junk Button
This will take you to the Junk messages that you have.
2. Select a message
Select a junk message from the list.
3. Locate the Delete group on the ribbon
The Junk email options is located in the 'Delete' group on the ribbon in the Home tab.
4. Select Junk Email Options
Click on the Junk email options button and a popup window will appear.
5. Choose one of the protection levels
Select the protection level you want from the various options listed including low, high, automatic etc.
Answer:
select a message, locate the Delete group on the ribbon, click the junk button, select junk email options, choose one of the protection levels.
Explanation:
what format can be applied to text in excel?
You can apply accounting format,date,numbers, currency, percentage or even fraction
I need help pleaseeee
Answer:
The Answer is C. Hope you get it right, Good Luck!!!
Answer:
The answer is B
Explanation:
To create a list, paragraph, or unordered list, you should use HTML code, whereas in CSS coding, you can change the overall font size of a tag using the font-size=(number) tag.
Describe how each command is used by matching the command to its purpose.
removes data fror
places it on the cli
Paste
cancels a previou
Undo
restores a previou
Copy
duplicates data a
clipboard
Cut
Redo
places data in its
Answer:
The correct answer to this question is given below in the explanation section.
Explanation:
The correct command matches its use are given below:
Paste Places data in its
Undo Cancel a previous
Copy Duplicates data on the clipboard
Cut Removes data for places it on the clipboard
Redo restores a previous
Paste term is used when you are placing copied data. Undo is used to cancel a previous action performed while Redo is used to restores a previously performed action. The copy is used to duplicate data on the clipboard while Cut is used to removes data for places/ to paste somewhere else.
Please help.
Why I'm I getting a syntax error.
In python, the word list is a keyword. It's not meant to be used for a variable. Try changing list to lst. There also might be other parts wrong with your code. If we could take a look at your whole function, we could determine if there is anything else wrong with your code.
What are the characteristics of calendar sharing options in Outlook 2016? Check all that apply.
Answer:
a,b,c,e
Explanation:
Answer:
Quit your bickering in the replies on the other answer, this is correct.
Explanation:
Someone plz im begging for ur help plzz??
Answer:
woah what subject is this-
Explanation:
Who you think is better? Ninja or TFue ,btw do you know who icebear is?
Answer:
no, no i dont think i will.
Explanation:
ABC IF U HAVE A LEGENDARY PET ON ADOPT ME OR ANYTHING COOL!! <3
Answer:
ABC PLEASE
Explanation:
Answer:
ABC i have mega owl and neon cow and mega frost <3
The Quick Access tool bar allows you to customize the actions or commands you frequently use.
True
False
Which of the following expressions shows the correct amount of sales tax for the computer at Store A? Select all that apply.
6%($1,200)
0.6($1,200)
0.06($1,200)
One-sixth($1,200)
StartFraction 3 over 50 EndFraction($1,200)
Answer:
6%($1,200) 0.06($1,200) 3/50($1,200)
Explanation:
hope this helps sorry if i am wrong
have a nice day
Answer:
a,c,e
Explanation:
it just makes sense U^U
¿En cuales situaciones concretas se puede aplicar las técnicas de conteo(particularmente las permutuaciones y las combinaciones) dentro de la informática?
Answer:
In which specific situations can counting techniques (particularly permutuations and combinations) be applied within computer science? for anybody trying to help