Take online courses.
Watch video tutorials.
Read books and ebooks.
Complete coding projects.
Find a mentor and a community.
Consider enrolling in a coding boot camp.
How do you indicate a new paragraph?
<img>content</img>
<em>content</em>
<a>content</a>
<p>content</p>
Answer:
i think it says it here https://www.peachpit.com/articles/article.aspx?p=674695&seqNum=6
Explanation:
content
¿por que hay peligros en internet?
Answer:
Wait
it eases off.
Get home,
gathered,
very close and look up –
we find it’s all right.
Play:
they be.
For life,
but all vanished
picture faces –
matter: I do or don’t.
More,
something
out of hold
squeeze it tightly
my best,
my best life.
Opened,
something –
back at that moment –
all marchers
the room, the door, the front
rang through the outside
Explanation:
Evaluate the https://mwasalat.om/en-us/ website you should mention the following criteria in evaluating the website. Look & feel Usability . Readability Traffic & Suggestions to improve the system
https://mwasalat.om/en-us/
Answer:
sorry i need points .................
Need help: what is 10^2
Answer:
100
Explanation:
Answer:
100
Explanation:
hope it helps
Your agile team only has one database developer. So the other developers finish their tasks and then wait for their work to be Integrated into the database. This creates a backup for the database developer. But it also means that the other developers must either wait or add to a growing pile of database work. What's one possible solution to this challenge?
Members of an Agile development team often agrees on what tasks to work on and they do it together. The one possible solution to this challenge is to Have the database developer train the rest of the team so there are fewer handoffs.
Agile development team often works together as a team. They as team discuss the task yo take, when it will take place etc.
This team is all about communication, teamwork, problem-solving etc.
Conclusively, A task should be completed by one member on the team, but the team may choose to pair up when doing the work.
Learn more from
https://brainly.com/question/24383225
See full question below:
Your agile team only has one person who knows how to develop database software. So the other developers finish their tasks and then wait for their work to be Integrated into the database. This creates a pile of backed up work for the database developer. But it also means that the other developers must either wait or add to the growing pile of database work. What's one possible solution to this challenge?
Select an answer:
Have the database developer train the rest of the team so there are fewer handoffs.
Have the software developers split their time between other teams so they're not as productive
Encourage the database developer to work overtime to catch up with their work.
Create a large batch of work so the database developer can focus on finishing
A __________ is a special Spanning Tree Protocol (STP) frame that switches use to communicate with other switches to prevent loops from happening in the first place.
What is a database? A) a structured collection of related files and data B) simply a collection of data C) a data file holding a single file D) flat files used to store data
Answer:
a
Explanation:
A database is a structured collection of related files and data. The correct option is A).
What is the purpose of a database?In computing, a database is a structured collection of data that is electronically stored and accessed. Large databases are stored on computer clusters or in the cloud, whilst small databases can be retained on a file system.
Data is kept in a single table structure in a flat file database. Multiple table structures are used by relational databases to cross-reference records. Both types of tables arrange data in rows with a single piece of information per column.
The primary purpose of every database is to store data, which includes text, images, and even media files. To store articles and other published content, user information, contact information, links to other websites, adverts, etc., all modern dynamic websites rely on one or more databases.
Therefore, the correct option is A) a structured collection of related files and data.
To learn more about the database, refer to the link:
https://brainly.com/question/13262352
#SPJ6
Write a python program to print the square of all numbers from 0 to n. Where n is user input.
You found the prime factorization of the number 72.
Explain how you can check your answer.
You’ll get 100 points. I swear.
Answer:
Explanation:
Start dividing the number by the smallest prime number i.e., 2, followed by 3, 5, and so on to find the smallest prime factor of the number. Again, divide the quotient by the smallest prime number. Repeat the process, until the quotient becomes 1 after repeated division.
A print server uses a print ________ as a software holding area for jobs waiting to be printed.
Answer:
spooler
Explanation:
A print server uses a print spooler as a software holding area for jobs waiting to be printed.
Select the three responsibilities of producers.
providing graphics
being on time
being on budget
being on target
providing collateral content
being error free
Describe alternative storage location(s) that could be used for data backup storage. What are the advantages and disadvantages of using such locations
Answer:
fácil solo regalar a los jóvenes que y poner un stock en él
g Write a recursive program that causes the program to crash. How calls does it take before it crashes
Answer:
Every recursive function must have a base condition that stops the recursion or else the function calls itself infinitely. The Python interpreter limits the depths of recursion to help avoid infinite recursions, resulting in stack overflows. By default, the maximum depth of recursion is 1000 .
Explanation:
steps involved in using a class
Class
Strictness And Knowledge And Behaviorr
¿Qué tipo de información deben proteger los sitios de comercio electrónico?
please help me excel questions!
Answer:
hi,hi,hi,hi,hi,hi,hi,hi,hi,hi,hi,hi,hi
a software that interprets commands from the key board and mouse is know as
Explanation:
a virus does that............
Which process would benefit from the use of Robotic Process Automation?
Answer:
Cost-Effective. Accuracy & Quality. Consistency. Improved Analytics. Increased Employee Productivity.You will complete this task in your own editor and upload a file named menu1.py to the zybook.
Write a function called menu_info that has two required parameters, both strings.
The first string is the name of a csv file with 1 row per menu item and 1 column per piece of nutritional information (including a header row) and the second string is the name of 1 menu item.
The function should read in the csv file and then return a list of lists. The first list is the header row and the second list is all of the data for the specified menu item.
In your file, and outside of your function, use 2 input statements to ask the user for the name of the file and the menu item. Then use those values as the parameters to call your function. Print the list of lists that is returned from your function call.
Your code should work for any csv file with this structure. A sample file can be downloaded in the lab.
Menu Summary
In your own editor, create a file named menu2.py that you will upload to the zybook for your submission.
Write a function called menu_summary that has one parameter, a string with the name of a file with the menu for a restaurant. \
The first row of the csv file is the headers. The second row tells you if 'healthy' is defined as a high or low value for that category, and then there is 1 row per menu item.
The function should read in the csv file and then create a dictionary where the keys are the nutrition headers and the values are the menu items (one per nutrition category) that have the 'healthiest value for that category. Return the dictionary.
In your file, and outside of your function, use 2 input statements to ask the user for the name of the file and the menu item. Then use those values as the parameters to call your function. Print the dictionary that is returned from your function call.
Your code should work for any csv file. You may download a sample file from the lab.
Answer:
abc
Explanation:
A machine learning model is used to tell if an object is an apple or not. It uses 10 pictures of apples and keeps on getting it wrong. Look at the graph below. How can you make the model better?
Answer:
Add more pictures of apples to the model.
Explanation:
You are working part time providing computer support for a veterinarian’s office. When you arrive to work one morning, the receptionist informs you that the computer monitor is not displaying anything. List at least three steps you will perform to troubleshoot the problem, and list three possible causes.
reboot the whole computer,
Explanation:
someone being on it when they shouldn't have
What is the meaning of s used in 0 and 1 in computer .
Answer:
A switch, unless it's busted, can be either on or off, closed or open. A switch that is “on” or “closed” passes electrical signal through it, while a switch that is “off” or “open” blocks that signal. Computer Scientists represent an “on” switch with a 1 and an “off” switch with a 0.
Explanation:
hope this helps!!
What is confidentiality and example?
Answer:
Confidentiality is the act of keeping things private. For example, the Government keeps very important things confidential in order to protect National Security.
What's wrong with SontungMTP's song?
A) The passing rain
B) laylalay
C) Bigcityboy
who is a fan i know
Answer:
A
Explanation:
write a program that reads a one-line sentence as input and then displays the following response: if the sentence ends with a question mark (?) and the input contains an even number of characters, display the word Yes. If the sentence ends with a question mark and the input contains an odd number of characters, display the word No. If the sentence ends with an exclamation point (!), display the word Wow. In all other cases, display the words You always say followed by the input string enclosed in quotes. Your output should all be on one line. Be sure to note that in the last case, your output must include quotation marks around the echoed input string. In all other cases, there are no quotes in the output. Your program does not have to check the input to see that the user has entered a legitimate sentence.
We use if-else structure to check if the sentence meets the requirements for each situation.
endswith() method is used to check if the sentence ends with the target character. modulo(%) operator is used to check if the sentence contains even or odd number of charactersescape character is used to print the quotation marks in the else partComments are used to explain each line of the code.
#get the user input
sentence = input("Enter a sentence: ")
#check if the sentence ends with ? and has even number of characters
if sentence.endswith("?") and len(sentence) % 2 == 0:
print("Yes")
#check if the sentence ends with ? and has odd number of characters
elif sentence.endswith("?") and len(sentence) % 2 == 1:
print("No")
#check if the sentence ends with !
elif sentence.endswith("!"):
print("Wow")
#used for other situations
else:
print("You always say \"{}\"".format(sentence))
You may see a similar question at:
https://brainly.com/question/14851610
Which protocol should John select to prevent unwanted network access and be configured to permit traffic only from specific addresses and provide security
In order to prevent unwanted network access, John should configure a media access control (MAC) protocol to provide security and allow (permit) network traffic only from specific addresses.
The physical address of the network interface card (NIC) for a networking device is referred to as media access control (MAC) address.
Generally, this physical address is permanently configured on all networking devices and it is unique to each device.
This ultimately implies that, a media access control (MAC) address can be used to uniquely recognize and allow (permit) traffic from a network device such as a PC that is operating on a network.
In conclusion, John should configure a media access control (MAC) protocol to provide security and allow (permit) network traffic only from specific addresses.
Read more: https://brainly.com/question/24112967
Write code to assign name and density properties to currMat, and store currMat in requestedMaterials. Input first receives a name value, then a density value. Input example
The code block creates a list of tuples which holds the name and Density values of materials. The program written in python 3 goes thus ;
name = input()
#accepts name input from user
name = [n for n in name.split()]
#split the inputs
density = input()
#accepts density inputs
density = [int(d) for d in density.split()]
#split the density inputs
currMat = list(zip(name, density))
#combines the inputs into a list of tuples
requestedMaterial = currMat
#assigns to another variable
print(requestedMaterial)
A sample run of the program is attached
Learn more :https://brainly.com/question/25700348
please help me social media marketing
What is white light?
White light is when green, blue, indigo, and violet are reflected.
White light is when all colors are absorbed.
White light is when red, orange, and yellow are absorbed.
White light is when all colors are reflected.
Answer:
White light is when all colors are reflected.
thank you
another team for confidentiality would be
A_security
B_cyber
C_cyber war
D_privacy