Answer:
The answer is [3:6]
Explanation:
At first i thought it would be sentence[3:5], but when i put my theory to the test, it was actually sentence[3:6].
hope i helped
Answer:
the answer is [3:6]
Explanation:
Which entity might hire a Computer Systems Analyst to help it catch criminals?
a law enforcement agency controlled by the government
a private investigator who used to work for the government
a credit card company that does business with the government
a financial management firm with ties to the government
Answer:
The correct answer to this question is given below in the explanation section.
Explanation:
The correct answer to this question is:
A law enforcement agency controlled by the government might hire a Computer System Analyst to help it catch criminals.
Because only law enforcement agency that is under control of government allows in any country to catch criminals. So, in this context the first option is correct.
While other options are not correct because:
A private investigator who used to work for the government does not need the services of a computer system analyst, because he may be assigned only one assignment. And, his purpose is to perform duty and complete the assignment. A credit company also does not allow the Government in any country to catch the criminal. A financial management firm also not allowed to catch the criminal, so in this context, only a law enforcement agency controlled by the government is allowed to catch the criminal. So, the first option of this question "a law enforcement agency controlled by the government" is correct.
Answer:
A
Explanation:
HOW CAN A PERSON GET BENEFITTED BY THE ICT BASEDSERVICES PROVIDED BY GOVERNMENT
Answer:
Explanation:
It aims to transform the entire ecosystem of public services through the use of information technology.ICT holds particular promise in areas of governance and public participation. Age can use information to reduce corruption and increase government transparency, accountability, efficiency and so finally gud night guys and take care.
plz mark as brainliest
This is used to track a user’s browser and download history with the intent to display popup banner ads that will lure a user into making a purchase.
Select one:
Adware
Worm
Phishing
Malware
Answer:
Adware
Explanation:
Adware is software designed to display advertisements on your screen, most often within a web browser.
Hope that helps.
A software that used to track a user’s web browser and download history with the intent to display popup banner adverts (ads) that will lure an end user into making a purchase is: A. Adware.
An adware is also referred to as an advertisement-supported software and it can be defined as a software application (program) that is designed and developed to automatically display advertising materials such as banners or pop-up adverts (ads) on the graphical user-interface (GUI) of a user's computer system or mobile device.
The main purpose for the development of an adware is to automatically display popup banner adverts (ads), in order to lure or convince an end user into making purchase of the advertised product or service.
In conclusion, an adware is a software that is typically used to track and gather information about a user’s web browser and download history with the intent to display popup banner adverts (ads) that will lure an end user into making a purchase.
Read more on adware here: https://brainly.com/question/9692296
PLEASE HELP I WILL GIVE BRAINLIEST!!
What best describes the difference between the below images, where the car is in the second image is further along the road? Hint: Look at the XYZ directional gizmo at top right side. Look at the colors.
Someone help its about LA Doña 2
so basically I just wanted to know who has seen it all and where i can watch it
Answer:
If you look on Just watch it will show you the different people that currently have it right now it is sadly not on Netflix from what I could find out but it will probably be added later on.
Explanation:
Netflix sometimes takes its time adding shows which is sad but that is just how they work. I would recommend maybe trying it on a website that Just watch list or just buy the disc from eBay. either way, I wish you luck!
Describe how each command is used by matching the command to its purpose.
removes data fror
places it on the cli
Paste
cancels a previou
Undo
restores a previou
Copy
duplicates data a
clipboard
Cut
Redo
places data in its
Answer:
The correct answer to this question is given below in the explanation section.
Explanation:
The correct command matches its use are given below:
Paste Places data in its
Undo Cancel a previous
Copy Duplicates data on the clipboard
Cut Removes data for places it on the clipboard
Redo restores a previous
Paste term is used when you are placing copied data. Undo is used to cancel a previous action performed while Redo is used to restores a previously performed action. The copy is used to duplicate data on the clipboard while Cut is used to removes data for places/ to paste somewhere else.
why is hip hop and rap so popular
Answer:
its popular because hip hop and rap is a way for people to express themselves whether it be their feelings or something that happened in their life and it also evolved from different people
What do the letters 'P' and 'T' in PTZ stand for? 'P' stands for and 'T' stands for in PTZ.
Answer:
Pan, Tilt, Zoom
Explanation:
Essential Components for Creating a PTZ Camera Environment. ... The letters PTZ stand for “Pan, Tilt, Zoom,” which are the basic mechanical functions of these cameras.
Answer:Well want I think the 'P' and 'T' in PTZ stands for the 'P' stands for Pan, and 'T' stands for Tilt?
Explanation:
You have to match the letter nexts to the numbers
Answer:
Word is for business letter 4+a
2+c Monthly budget expenses
3+b is for presentation
1+d department store inventory
where can you apply the hand wire splicing technique
Answer:
When you want to extend an electrical wire for an apparatus, e.g., a lamp or a speaker.
Which is better, in most situations, a bumper switch or a limit switch, and why?
Answer:
limit switch because why not
Explanation:
Explain three causes of repetitive stress injuries (RSI)
RSI can occur when you do repetitive movements. Those movements can cause your muscles and tendons to become damaged over time.
Some activities that can increase your risk for RSI are:
● stressing the same muscles through repetition
● maintaining the same posture for long periods of time
● maintaining an abnormal posture for an extended period of time, such as holding your arms over your head
● lifting heavy objects
● being in poor physical condition or not exercising enough
HELP ASAP GIVING BRAINLIEST
Answer: top 4
Explanation:
. Write a Python command to assign the value 80.35 to a variable called 'point'.
Answer:
point=80.35
Explanation:
what does this mean??
Answer:??????????????
Explanation:
Answer:
what the heck maybe you have to call apple
Explanation:
Please help.
Why I'm I getting a syntax error.
In python, the word list is a keyword. It's not meant to be used for a variable. Try changing list to lst. There also might be other parts wrong with your code. If we could take a look at your whole function, we could determine if there is anything else wrong with your code.
Select all the mistakes in the following: There may be more than one.
if (count = 10):
print ("Hello")
elseif (count > 100):
print ("Good-bye")
else
print("WAIT!")
If anyone knows the answer that would be greatly appreciated. Thanks
The if statement should have two equal signs, the elseif should be elif, and the else statement should have a colon at the end of it. There might be more errors in the indentation but I cant know unless I see a picture of the problem. The print statement should be indented into the if, elif, and else statements.
Pls Hurry!!!
What is the missing line of code?
>>> answer = "happy birthday"
>>> _____
'Happy birthday'
upper(answer)
capitalize(answer)
answer.capitalize()
answer.upper()
Answer:
It is answer.capitalize()
Explanation:
The missing line of code is:
>>> answer = "happy birthday"
>>> answer. Capitalize()
'Happy birthday'. The correct option is (C).
What do you mean by the line of code?Source lines of code (SLOC), also referred to as lines of code (LOC), is a software metric that counts the lines in the source code of a computer programme to determine the size of the programme.
Use cloc filename> to obtain the lines of code contained in a single file. To obtain the code lines in a straightforward Vue file, we are utilizing the command.
Furthermore, it acknowledged that it is a VueJS component. Using the cloc —by-file command, we may examine every line of code included in a file or directory.
Therefore, the missing line of code is:
>>> answer = "happy birthday"
>>> answer. Capitalize()
'Happy birthday'.
To know more about the line of code, visit:
https://brainly.com/question/18844544
#SPJ2
where to buy a ps5
I really want one please help meh
Answer:
You can buy one at gamestop, target, walmart, best buy and probably more stores
Answer:
Amazon, walmart, target, gamestop?
Explanation:
I'm sure a quick go ogle search will get u what u want to see, have a nice day and I hope u get what u want!
Hi, I couldn't delete my questions so I'm just editing them so you don't have to do it.
Plagiarism occurs when writers
use others’ ideas and writing as their own.
exclude a bibliography from their work.
include direct quotations from others.
use others’ work as inspiration.
Answer:
A- Use others' ideas and writing as their ownExplaniation:
it's plagiarism, just don't take other people's work and pass it as your own. smh lol
Answer:
Just so I don't get reported for copying I will tell all the answers that are not right.
Explanation:
B.
C.
D.
Hope this helps.
Formulas should follow the___
last cell used
signs
order of operations
call of operations
Answer:
Order of operations
Explanation:
A spreadsheet software program requires that users predefine each field’s data type. The software program is most likely programmed using a language that is
open.
predefined.
strongly typed.
weakly typed.
Answer:
Pretty sure its weakly typed
Answer:
strongly typed
Explanation:
Anisha was learning ‘for’ and ‘while’ loop. Help her understand why for and while loops are called entry controlled loops.
Entry controlled loop - The loop which has a condition check at the entrance of the loop, the loop executes only and only if the condition is satisfied is called as entry control loop.
So, for and while loops are its examples.
_____ is the practice of using the internet to provide healthcare without going to a doctor’s office or hospital.
Telenurse
Telehospital
Telehealth
Teledoctor
Answer:
The answer to this question is given below in the explanation section.
Explanation:
The correct answer to this question is Telehospital.
Because Telehospital provides services where patients treated online by a physician. It is like providing medicine services remotely to patients.
A live secure connection is established between patient and physician where physicians diagnose patient disease and recommend transcription.
It is the same as a typical visit to the hospital, except the doctor and patient are not on the same physical location. They are connected with each other remotely.
While other options are not correct because: telenursing is related to providing nursing services online, where telehealth is providing all health care services, it also includes education, training, and administrative services also. While teledoctor and telehospital used interchangeably.
But telehospital is the most and widely used term to diagnose patients remotely by physicians.
Answer- C: Telehealth
Explanation: Correct on Edg 2021
Which best describes what a works-cited list includes?
sources found during research
sources cited in a paper
sources quoted in a paper
sources examined during research
Answer: Sources cited in a paper
Explanation:
Answer:
B
Explanation:
The ______ is designed to store audio data on computers and/or digital music players.
A. waveform
B. audio file format
C. sample rate
D. bandwidth
Answer:
audio file formats of computer
WILL MARK BRAINLIEST FOR ANYONES ANSWER!
What things would you consider if you were to make a dream computer with $5,000?
Speed:
Reliability:
Cost comparisons:
Ease of use:
Graphics and streaming media capabilities:
lastly, why you made these choices.
Answer:
just know that bit gonna be running when I make mine Imma have 720 fps btw today sponsored is nord VPN
WRITE IN YOUR OWN WORDS:
What is a possible sign that your computer has been hijacked by Botware?
Answer:
One major sign of a computer being hijacked is the use of system resource by unknown programs. For example, full memory, high cpu usage, slow start up, crashes and errors, and low avalible storage space.
Explanation:
the contents in cells are A1 through A6 are 6,3,4,7,9 and 7. What function would return the answer 6?
Answer:
The formula =AVERAGE(A1:A6) would return the average of those numbers which is '6'.
Explanation:
The content in cells is A1 through A6 are 6,3,4,7,9 and 7.As the average of 6,3,4,7,9 and 7 is 6.
If the range A1:A6 contains numbers, the formula =AVERAGE(A1:A6) would return the average of those numbers.
Therefore, the formula =AVERAGE(A1:A6) would return the average of those numbers which is '6'.