In python, the equal sign is used to put data into a variable
true
false

Answers

Answer 1

Answer:

True

Explanation:

The equals sign is used to assign a value to a variable

Answer 2

Answer: It is true

Explanation:

I got 100% on the quiz


Related Questions

give me code so I can get rid of the time limit on my mac it is a mac big sure fully updated please help

Answers

Answer:

Explanation:

The time limit on your Mac is likely imposed by your parents. Mac OS allows parental control on children accounts. If you want to get rid of the time limit, you should log in using your parents' accounts.

need the answer ASAP. I’ll mark brainliest

they’re all the same options for each sentence.

Answers

Answer:

Explanation:

pop(): Remove an item from the end of an array  

push(): Add items to the end of an array  

shift(): Remove an item from the beginning of an array  

unshift(): Add items to the beginning of an array

Which of the following is NOT a function? print, input, if, capitalize?

Answers

Answer:

there are no options

Explanation:

Does any one know how to code? If you do can you help me with my project?

Answers

Answer:

kinda look it up!!!

Explanation:

go to code.org free coding

i can help you man

-scav aka toby

Explain one rule the company must follow when using cookies on its website.

Answers

Explanation:

Work out what cookies your site sets, and what they are used for, with a cookie audit.

Tell your visitors how you use cookies.

Obtain their consent, such as by using Optanon, and give them some control.

someone help me!! i just gotta match these

Answers

Answer:

emails - allow attachments of files, such as images.

reports - convey more factual data that helps facilitate decision making.

memorandum - are written in a block style, with the body text aligned along the left margin.

business letter - are one page long.

I hope it's correct.

what is a robotic device?​

Answers

Answer:A robot is a programmable mechanical device that can perform tasks and interact with its environment, without the aid of human interaction. Roboticsis the science and technology behind the design, manufacturing and application of robots. The word robot was coined by the Czech playwright Karel Capek in 1921.

Explanation:

Answer:

A robot is a machine—especially one programmable by a computer— capable of carrying out a complex series of actions automatically. Robots can be guided by an external control device or the control may be embedded within.

Explanation:

A robotic device is a device that can be programmed and possibly be automated

Finish the program by choosing the correct terms.

# Count the number of wins, losses. Find the sum of the opponent's points.
wins=0
losses = 0
sum = 0
_____ item in scores:

sum = sum + item[1]
if item[0] > item[1]
wins = wins +1
_____:

losses = losses +1

•Else
•For
•While

Answers

What are the exact numbers

Answer:

For

Else

Explanation: Got it right

30 points

A company values its data and therefore takes steps to ensure it is protected. Which of the following factors may be included in an AUP specifically to protect data?

(Choose all that apply.)

Use of nonsanctioned software on company computers.

Access to sensitive data should be limited to only employees that need the data to do their jobs.

Responsibility for keeping virus checker software is made explicit.

Staff should not read the news on CNN during company time.

They discover that employees, on company time and using company resources, disclose proprietary company information at social networking sites.

They discover that employees, on company time and using company resources, discredit their fellow employees at social networking sites.

Answers

Answer:

The options that apply are:

B, C, D,

Explanation:

AUP refers to the Acceptable Use Policy.

The AUP is usually created to protect company IT resources which include but are not limited to Data (as in information), Data (as in bandwidth) and general IT security.

When people are issued, an AUP, it is so that they understand that they aren't the only ones who need and who use the company's IT resources especially data, hence, they have to use the same responsibly.

So, it may be qualified as a "fair use policy".

It is usually created and administered by the owner, key administrator of an online network, website, or service.

It serves the purpose of providing guidance as to how the resource must be used.

Cheers

explain four sitting postures in a computer laboratory​

Answers

1. Push hips back
2. Adjust seat
3. Sit up straight and roll your shoulders back
4. Feet flat on floor

A Program is an Algorithm – a set of directions for the computer to follow.

True
False

Answers

Answer:

True

Explanation:

What is wireless?

a network that covers a large geographical area
a network confined to a limited geographical area
the process of sending data to the receiving device
a method of connecting computers using radio signals instead of physical wires

Answers

Answer:

The correct option is;

A method of connecting computers using radio signals instead of physical wires

Explanation:

Wireless is the term used to describe a network connection between two or more devices, such as computers, mobile phones and routers, that make use of a radio signal system instead of physical wires for data connection between the nodes in the network

It enables the avoidance of the necessary cost involved in the process installing physical network wires in a premise

The three basic types are Wireless Wide Area Network, WAN, Wireless Local Area Network, WLAN, and Wireless Personal Area Network WPAN.

In a closed isolated system such as the universe, the amount of _____________ does not change.
Group of answer choices

Energy

Radiation

Chemicals

Sun light

Answers

Answer:

Energy

Explanation:

Facial recognition software can do all of the following, except: Match photos based on facial features Generate a picture based on an eyewitness description Be used on a smartphone Search photo databases

Answers

Answer:

Generate a picture based on an eyewitness description

Explanation:

Facial recognition can only recognise faces it cannot generate new faces.

11.5 Code Practice Edhesive??

In this code practice, we will continue to employ W3Schools tools to practice writing HTML. You should have already read through the tutorials for the four HTML topics below, found in Lesson 11.5. Now, complete the exercises linked below for each topic. Once you complete these exercises, move onto the next set of instructions below.

HTML Styles (Links to an external site.)
HTML Formatting (Links to an external site.)
HTML CSS (Links to an external site.)
HTML Links (Links to an external site.)
Create a web page that has two paragraphs. One of the paragraphs should be aligned to the center and have red text. The other paragraph should be aligned to the right and be in italics. Refer to the sample below for clarification.

11.5 Code Practice example

Your program should begin and end with the following tags:



# Insert your code here!


In the programming environment, you will notice that once you type one tag (for example, the html opening tag), the environment automatically populates the closing tag for you. Be careful not to double up on closing tags, otherwise your HTML will not run.

As you write your web page, you can click the "Run Code" button to view it in real time.

Answers

Answer:

<html>

<body>

<p style="text-align:center;color:red;">This is a paragraph.</p>

<p><i> "This text is italic</i></p>

</body>

</html>

Explanation:

I got a 75%. Hope this helps.

HTML codes are placed in segments called tags.

Tags are divided into two

The opening tagThe closing tag

Take for instance, the opening and closing tags of the paragraph tag are <p> and </p>, respectively.

Having explained what tags are, the required HTML code is as follows:

<html>

<body>

<p align="center"><font color="black"> This is a paragraph 1</font></p>

<p align="right"><i> This is a paragraph 2 </i></p>

</body>

</html>

The paragraphs are aligned using center and right alignments, while the text in the first paragraph is colored using the color tag

Read more about HTML at:

https://brainly.com/question/25055825

:) y’all are so nice for helping me ty , but any idea what this is?

Answers

Answer:

Best way is 3

Worst way is the rest

Explanation:

Answer:

the answer is  3

4. True or False: In order to use wi-fi signal/network, you have to remain seated in one spot.

True
False

5. True or False: Bluetooth will let you use a smartphone to share data or files with another smartphone?

True
False​​

Answers

Answer:

4. flase

5. true

Explanation:

If your getting wifi signal on your phone right now while where running in your house or traveling through the kitchen, you don't have to sit in one spot.

I tried doing that with another phone but It didn't work... :(

Question 21 pts How many lines should an email signature be? Group of answer choices "5 to 6" "7 to 8" "1 to 2" "3 to 4"

Answers

Answer:

"3 to 4"

Explanation:

Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties. One of the most widely used communication channel or medium is an e-mail (electronic mail).

An e-mail is an acronym for electronic mail and it is a software application or program designed to let users send and receive texts and multimedia messages over the internet.

An email signature can be defined as a group of texts (words) that a sender adds to the end (bottom) of his or her new outgoing email message. It is considered to be a digital business card that gained wide acceptance in the 21st century. Also, an email signature is a good etiquette in all formal conversations because it provide the recipient some level of information about the sender of an email message.

Ideally, an email signature should be three to four lines and must contain informations such as name, website address, company name, phone number, logo, catch phrase or quote, social icons, etc.

Additionally, you shouldn't place an email signature at the top or anywhere else in the email except at the bottom, immediately after the closing line.

PLS, PLS, PLS, HELP! I RLY NEED THIS. PLSSSSS

A guest has requested to host a special event in the main dining room, and you've been asked to help with the planning. You need to order helium balloons from your local Party Center, but you are trying to keep costs down. Each balloon costs $1.00 but if you buy more you get a great discount. Here is the cost for balloons at the Party Center:

Up to 50 balloons - $1.00 each
Over 50 and up to 100 - $0.50 each additional balloon
Over 100 - $0.25 each additional balloon
For example, if you buy 150 balloons, it will cost you:
First 50 = $50
Next 50 = $25
Next 50 = $12.50
--------------------------
Total 150 balloons = $87.50

Write a program that prompts for the number of balloons and then calculate and display the total cost for the balloons for your party.

Answers

It's pretty hard but I think it is 1,350

how computer viruses spread from one computer to another​

Answers

Viruses spread when the software or documents they get attached to are transferred from one computer to another using a network, a disk, file sharing methods, or through infected e-mail attachments. Some viruses use different stealth strategies to avoid their detection from anti-virus software.

Which of the following allows computers to communicate with each other? RAM NIC Hard drive Floppy disk

Answers

Answer:

NIC (Network Interface Card)

Explanation:

A network interface card is used to connect a computer to a computer network allowing for data to be transmitted between computers.

What is the problem, if any, with the following code?The desired output is [3,19].

>>> aList = [19,3]
>>> aList[O] = aList[1]
>>> aList[1] = aList[O]
>>>aList

•There is no problem.

•You need a temporary variable to hold the value 3.

•You need parentheses around 0 and 1, as in
aList(0) and aList(1).

•You need to import list to use a list.

Answers

Answer:

             You need a temporary variable to hold the value 3.

Explanation: Other user is correct

The problem with the code is that you need a temporary variable to hold the value 3. which is the correct answer would be an option (B).

What is the temporary variable?

A temporary variable in computer programming is a variable with a brief lifespan, typically used to retain data that will be deleted quickly or before it can be placed in more permanent program memory.

The problem with the code is that you need a temporary variable to hold the value 3.

In the first line of the code, the list is initialized with the values 19 and 3. In the second line, the value at index 0 is assigned to the value at index 1, which is 3. This means that the list now contains values 3 and 3.

In the third line, the value at index 1 is assigned to the value at index 0, which is also 3.

This means that the list now contains values 3 and 3, so the output is [3,3] instead of the desired output [3,19].

To fix this problem, you can use a temporary variable to hold the value 3 before assigning it to the other index. The code would look like this:

aList = [19,3]

temp = aList[0]

aList[0] = aList[1]

aList[1] = temp

aList

To learn more about temporary variables click here:

https://brainly.com/question/20309413

#SPJ2

Which of the following is the most accurate definition of a botnet? a small text file passed to a Web browser on a user's computer by a Web server destructive software robots working together on a collection of zombie computers via the Internet spider software used by a search algorithm to crawl various Web sites to return a query a common platform used by search engines to index the contents of a Web site a fraudulent e-mail attack that targets a specific person or organization by personalizing the message

Answers

Answer:

destructive software robots working together on a collection of zombie computers via the Internet

Explanation:

Botnets are devices controlled via the internet to achieve a goal that requires multiple computers working towards a shared task. e.g. Denial of service attacks and mass email messaging.

What is different between science and technology





Answers

Answer:

Science involves observing a body of fact systematically through experiments while technology is the application of these established facts for the betterment of human lives and the world at large.

Explanation:

Science can be defined as a branch of intellectual and practical study which systematically observe a body of fact in relation to the structure and behavior of non-living and living organisms (animals, plants and humans) in the natural world through experiments.

Technology can be defined as a branch of knowledge which typically involves the process of applying, creating and managing practical or scientific knowledge to solve problems and improve human life. Technologies are applied to many fields in the world such as medicine, information technology, cybersecurity, engineering, environmental etc.

Basically, knowing how to use a technology simply means a scientist understands the appropriate method or technique to be used in the application of a technology such as when solving a problem. Also, knowing when to use a technology means to know the appropriate time to use a particular technology without it having any repercussion or adverse effect.

Generally, technology has impacted the world significantly and positively as it has helped to automate processes, increased efficiency and level of output with little or no human effort.

You have previously used slicing with strings.

What is the output?

str = 'abcdef'
print(str[2:5])


cde

bcde

cdef

bcd

Answers

Answer:

cde

Explanation:

just took the test :)

Answer:

cde

Explanation:

B. Direction: Choose the letter of the correct answer.
11. Filler comes from silex, raw linseed oil, and turpentine.
A. Shellac
b paste filler C. Varnish
d. paint
12. A kind of varnish that is not waterproof.
A Paint
b. Shellac c. Enamel
d. Lacquer
13. What kind of varnish that dries up easily and is not waterproof? It comes from lac gum
diluted in alcohol
A Varnish
b. stains c. Enamel d. Shellac
14. A kind of stain that is easiest to apply on wood.
a. Spirit stain b. fillers c Oil stain
d. paint
15. It prevents moisture on the wood that causes decay.
a. Enamel
b. paint
c. Varnish
d. lacquer​

Answers

That the whole paper bro

why do we need to include this information about online platform?











꧁NOTE::::LINKS ARE NOT ALLOWED FOR THIS QUESTION꧂

Answers

Answer:

online platform is defined as a digital service that facilitates interactions between two or more distinct but interdependent sets of users (whether firms or individuals) who interact through the service via the Internet Like i said above, platforms enable interactions and transactions between interdependent groups. ... While traditional businesses create value by creating products or services, platforms create value by enabling these transactions.

Explanation:

~Bre

______ behavior expected from every professional​

Answers

Answer:

Respectful

Explanation:

Explica el funcionamiento del puente de diodos. Indica los diodos que se encuentran en polarizacion directa en inversa en cada semiciclo de la onda alterna de entrada

Answers

Answer:

puente de diodos se utiliza cuando queremos transformar una señal de fase alterna en una continua, para tener la ruta actual que siempre va en la misma dirección.

En polarización directa, el flujo depende principalmente en los portadores mayoritarios. Debido a la región de empobrecimiento reducida, y a la atracción del potencial contrario al material, se incrementa la corriente que fluye a través del diodo.

Explanation:

espero y esto te pueda ayudar

Latent data is easier to find than visible data on a computer. True False

Answers

Answer:

False

Explanation:

"Visible data is data that the computer operating system is aware of and is easily accessible by the user or a trained professional. Latent data is data hidden in all kinds of places in the computer and the operating system is not aware of it nor does it know where to find it, nor does the untrained user." Latent data cannot generally be viewed through typical applications, whereas visible data can be.

Answer:

False

Explanation:

It is False

Other Questions
if you were to completely avoid the most frequently used technology tool in your life, how would you feel? what would be its effect on your life? Which pair of verbs correctly completes this sentence?Hier, ma cousine est __________ de sa bicyclette est elle sest ____________ la jambe.A. tomb, fracturB. tombe, fracturC. tomb, fractureD. tombe, fracture It is less than 100 greater than 10 and you use a total of 7 base ten blocks to show this number the number of tens blocks is greater than the number of ones blocks one of the digits is 4 what type of goverment did antifederalists favor Which activity is the best demonstration of J.J. Thomsons use of creativity in his work? How do stereotypes affect women? What is it in standard form What was the possible danger in the United States issuing the Monroe Doctrine? Indicate whether the sentence or statement is true or false.The Koreans war became a stalemate between North Korea and South Korea by 1951.Please select the best answer from the choices providedTF HELP NOW BRAINLIEST WILL BE GIVEN!!!!!Which process is demonstrated by the image below Do you think the government should regulate sugar like it does alcohol,tobacco, and other toxic substance A random sample of 25 items is drawn from a population. The sample mean is 850 and population standard deviation is 15. Find a 90% confidence interval I am between 2 and 10. I am a mixed number. I am closer to 8 than 4 if you take my fraction part away. I am an odd number what am i 1. Which of the following is an act of road rage?A. Remaining at a safe distance from the vehicle in front of youB. Allowing vehicles to merge into your laneC. Abrupt acceleration or brakingD. Honking your horn to warn the driver in front of you of a hazard You roll a fair six-sided die twice. Find the probability of rolling a 2 the first time and a number greater than 1 the second time. What is the perimeter of a rectangle with a length of 20 feet and a width of 12 feet? A. 32 feet B. 64 feet C. 240 feet D. 480 feet The bottom number is 12 cm it messed up the most common cause of accident among elderly isSelect onea electrecityb fallsC. poisonongOd chocking Find the missing side labeled x. Round to the nearest tenth.14 The act of preserving or maintaining a resource?