`list_strip` will reference the list `['03', '07', '2018']`.
After the following code executes:
```
my_string = '03/07/2018'
list_strip = my_string.sp
```
The code snippet seems to be incomplete, as it is missing the closing parenthesis and dot operator for the `split()` method. Assuming the correct code is:
```
my_string = '03/07/2018'
list_strip = my_string.split('/')
```
The variable `list_strip` will reference a list containing the elements resulting from splitting `my_string` at each occurrence of the forward slash ('/'). In this case, the list will contain three elements: '03', '07', and '2018'.
Therefore, `list_strip` will reference the list `['03', '07', '2018']`.
To learn more about string visit-
https://brainly.com/question/15683884
application software that is intended for use in a specialized business environment is called ____.
Application software that is intended for use in a specialized business environment is called an industry-specific application.
What is Application software?Application software may be characterized as a type of computer software package that performs a specific function directly for an end user or, in some cases, for another application. An application can be self-contained or a group of programs.
An application program is a computer program designed to carry out a specific task other than one relating to the operation of the computer itself. This type of software is specifically designed in order to handle specific tasks for users.
Such software directs the computer to execute commands given by the user and may be said to include any program that processes data for a user.
Therefore, application software that is intended for use in a specialized business environment is called an industry-specific application.
To learn more about Application software, refer to the link:
https://brainly.com/question/29032671
#SPJ1
Which ribbon tab is not a default in Outlook 2016's main interface?
Home
Send/Receive
Folder
Review
Answer:
Review
Explanation:
The ribbon tab is not a default in Outlook 2016's main interface is Review.
What is ribbon tab?The Ribbon tab in outlook has the options or commands used to do the tasks. Like creating new email, deleting emails, opening a new meeting request, defining category to an item. However, The Ribbon takes up a lot of space on Outlook 2016 screen.
It has Home, Send/Receive mails and Folder options on the ribbon tab except Review.
Thus, the ribbon tab is not a default in Outlook 2016's main interface is Review.
Learn more about ribbon tab.
https://brainly.com/question/24481253
#SPJ2
How would you select a column you want to sort using the A-Z command?
Pilihan jawaban
Select the whole column.
Select several cells in the column.
Select any cell in the data.
Click on a cell in the column.
To use the A-Z command to sort a column, we should choose any square in the data.
What is a computer command with an example?A command is a term or phrase that instructs the computer to carry out a certain action whether typed or spoken. For instance, the user would get a listing of files and folders in the subdirectory after running the "dir" command at an MS-DOS prompt and clicking Enter.
What does command mean in Windows?Sometimes the Command key is utilised similarly to the Windows Control key; for instance, pressing Command-P and Control-P will both print a document. The Logitech's Option key may, however, also perform Windows Control key duties. Look up Control key.
To know more about Command visit:
https://brainly.com/question/28497863
#SPJ4
which of the following method of threat hunting includes disrupt, deny, destroy, and degrade actions?
a. Threat Feeds
b. Intelligence Fusion
c. Maneuvering
d. Security Advisory
Method of threat hunting includes disrupt, deny, destroy, and degrade actions is Maneuvering.
What Threat hunting?
Threat hunting, also referred to as cyberthreat hunting, is a proactive method for finding ongoing, unremedied threats within the network of a company.
What is Maneuvering?
To execute a maneuver in military or naval operations in order to get the upper hand. Before it was prepared to attack, the regiment maneuvered for several days. : to make a sequence of positioning and direction modifications with a purpose in mind.
Threat hunting is an essential component of safety activity benefits and should be incorporated from the outset. Threat hunting, which goes beyond conventional recognition innovations like security data and occasion the board (SIEM), endpoint location and reaction (EDR), and others, is the art of finding the questions in the environment. Hunting can be done using a variety of tactics, and your group can decide which one best suits your objectives.
Learn more about threat hunting click here:
https://brainly.com/question/20595926
#SPJ1
Why should data be not taken from the internet directly?
Please solve it..!!
Answer:
Explanation:
some files and websites are out of controllable. because of the hackers
Data obtained from the internet should not always be taken at face value and used directly in important decision-making processes or analysis.
What is internet?The Internet (or internet) is a global network of interconnected computer networks that communicate using the Internet protocol suite (TCP/IP).
For several reasons, data obtained from the internet should not always be taken at face value and used directly in important decision-making processes or analysis.
Accuracy: Internet data accuracy cannot always be verified, and there is no guarantee that the information is correct.Reliability: The dependability of internet data is also debatable.Relevance: Internet data may or may not be relevant to your specific research or project needs.Legal and ethical concerns: Using data obtained from the internet may raise legal and ethical concerns, particularly regarding intellectual property rights, copyright, and privacy.Thus, data should not be taken from the internet directly.
For more details regarding internet, visit:
https://brainly.com/question/13308791
#SPJ2
Program code that can be evaluated to a value is called a(n):__________
Answer:
The answer is "expression"
Explanation:
An expression is a term or phrase, which is commonly used to transmits certain concepts, perceptions as thoughts. It is a mixed form of more than one operands, which is used to determines the values. It is a legal symbol, that combines the representing word like, operators, constants, and variables, that is arranged by language law.
please find the attachment for example.
An employee sets up Apache HTTP Server. He types 127.0.0.1 in the browser to check that the content is there. What is the next step in the setup process?
Answer:
Set up DNS so the server can be accessed through the Internet
Explanation:
If an employee establishes the HTTP server for Apache. In the browser, he types 127.0.0.1 to verify whether the content is visible or not
So by considering this, the next step in the setup process is to establish the DNS as after that, employees will need to provide the server name to the IP address, i.e. where the server exists on the internet. In addition, to do so, the server name must be in DNS.
Hence, the first option is correct
Your question is lacking the necessary answer options, so I will be adding them here:
A. Set up DNS so the server can be accessed through the Internet.
B. Install CUPS.
C. Assign a static IP address.
D. Nothing. The web server is good to go.
So, given your question, what is the next step in the setup process when setting up an Apache HTTP Server, the best option to answer it would be: A. Set up DNS so the server can be accessed through the Internet.
A server can be defined as a specialized computer system that is designed and configured to provide specific services for its end users (clients) on a request basis. A typical example of a server is a web server.
A web server is a type of computer that run websites and distribute web pages as they are being requested over the Internet by end users (clients).
Basically, when an end user (client) request for a website by adding or typing the uniform resource locator (URL) on the address bar of a web browser; a request is sent to the Internet to view the corresponding web pages (website) associated with that particular address (domain name).
An Apache HTTP Server is a freely-available and open source web server software designed and developed to avail end users the ability to deploy their websites on the world wide web (WWW) or Internet.
In this scenario, an employee sets up an Apache HTTP Server and types 127.0.0.1 in the web browser to check that the content is there. Thus, the next step in the setup process would be to set up a domain name system (DNS) so the server can be accessed by its users through the Internet.
In conclusion, the employee should set up a domain name system (DNS) in order to make the Apache HTTP Server accessible to end users through the Internet.
Find more information here: https://brainly.com/question/19341088
You add a style sheet link between which opening and closing tags?
<link> tag
The <link> tag is most often used to link to external style sheets. The <link> element is an empty element, it contains attributes only.
what's the best console do you guys think
Answer:
PS5
Explanation:
becuase its not hard to use
determine the first five terms of the sequence whose nth term is defined as follows. please enter the five terms in the boxes provided in sequential order. please simplify your solution.
The first five terms of the sequence are: 2, 5, 26, 677, 458330. A sequence is an ordered list of numbers or objects that follow a specific pattern or rule. In the sequence,each element is called as a term. The terms of a sequence can be finite or infinite, and they can follow various patterns or formulas.
To determine the first five terms of the sequence defined by a1 = 2 and an = (-an-1)^2 + 1, we can calculate the subsequent terms step by step.
a1 = 2
a2 = (-a1)^2 + 1 = (-2)^2 + 1 = 4 + 1 = 5
a3 = (-a2)^2 + 1 = (-5)^2 + 1 = 25 + 1 = 26
a4 = (-a3)^2 + 1 = (-26)^2 + 1 = 676 + 1 = 677
a5 = (-a4)^2 + 1 = (-677)^2 + 1 = 458329 + 1 = 458330
Therefore, the first five terms of the sequence are:
2, 5, 26, 677, 458330
The question should be:
determine the first five terms of the sequence whose nth term is defined as follows. please enter the five terms in the boxes provided in sequential order. please simplify your solution. a 1 =2 a1=2 and a n = (− a n−1 ) 2 +1 ⎯ ⎯ ⎯ ⎯ ⎯ ⎯ ⎯ ⎯ ⎯ ⎯ ⎯ ⎯ ⎯ ⎯ ⎯ ⎯ ⎯ ⎯ ⎯ ⎯ ⎯ √ an=(−an−1)2+1 for n≥2
To learn more about sequence: https://brainly.com/question/7882626
#SPJ11
Print even numbers till 50 in python coding.
In python, you can use a simple list comprehension to solve this problem.
print([x for x in range(51) if x % 2 == 0])
This code prints all the even numbers from 0 to 50 including 0 and 50.
Which of the following statements is correct?
a.
Audiences listen for information that contradicts their beliefs and values.
b.
Audiences intentionally ignore information that supports their beliefs and values.
c.
Audiences listen for information that supports their beliefs and values.
d.
Audiences are easily persuaded to believe new information.
Please select the best answer from the choices provided
A
B
C
D
Answer:
The correct answer is:
c. Audiences listen for information that supports their beliefs and values.
Answer:
c
Explanation:
this is true because I'm sure that if your talking about something someone is interested in, they are more likely to listen.
what is the meaning of website cookies? brief explanation
Answer: Cookies are messages that web servers pass to your web browser when you visit Internet sites
Explain why modern computers consist of multiple abstract levels and describe the main functions of each level
Modern computers must be quick, effective, and safe, which is why the system was introduced with several abstract layers. Abstract classes can always be used in multilevel inheritance.
Are two abstract methods allowed in a class?A class can only extend one abstract class in Java, but it can implement numerous interfaces (fully abstract classes). Java has a purpose for having this rule.
Can we use many abstract methods?The abstract keyword is used to make a class abstract. It may have 0 or more non-abstract and abstract methods. We must implement the abstract class's methods and extend it. It is not instantiable.
To know more about Abstract classes visit :-
https://brainly.com/question/13072603
#SPJ4
Please I need help
How does a hyperlink function in an Outlook message?
When the hyperlink is selected, a web page opens inside the message.
When the hyperlink is selected, a web page opens in the default browser.
When the message is opened, the hyperlink automatically opens a web page
When the message is opened, a web page displays in a special preview window
Answer:
The way hyperlinks function in an Outlook message is;
When the hyperlink is selected, a web page opens in the default browser
Explanation:
An hyperlink connects a user to another object
When an hyperlink is selected in an Outlook message, the window currently viewed changes from Microsoft Outlook message reading pane to the default browser or application that handles the information type to which the hyperlink address is pointing in the operating system
In Windows 10, the default browser is Microsoft Edge, and the default mail application is Windows Mail. Therefore, clicking an hyperlink in Outlook that links to a web page opens the default browser which is Microsoft Edge, while clicking on an email link in an Outlook message opens Windows Mail
What is the next line?
>>> tupleA = (5, 20, 30, 40, 30)
>>> tupleA.index(30)
3
1
0
2
Explanation:
solução de ácido clorídrico (HCI 6 m e HCI 0,6 m)
Answer:
2
Explanation:
edge 2020
e. Which type of computers comes in briefcase style
Answer: Laptop computers.
Explanation: Laptops are the one type of computers that come in briefcase style.
In order to be used as a primary key, which of these characteristics must an attribute possess with respect to a single instance of the entity? a. There must be a maximum of one attribute instance. b. There must be many instances of the attribute. c. There must be at most one entity instance that each attribute instance describes.d. There must be at least one instance of the attribute. e. There must be zero or more instances of the attribute.
A: The correct answer is option C: There must be at most one entity instance that each attribute instance describes.
What is attribute?An attribute is a characteristic or quality that describes an object, person, or concept. It can refer to physical or psychological characteristics, such as color, size, shape, texture, behavior, personality, or mood. Attributes can also describe intangible qualities, such as intelligence, creativity, or morality. Attributes can be used to describe and differentiate between different objects, people, or ideas. In programming, an attribute is a property or value associated with a particular object or element. Attributes are used to store data and provide information about an object. For example, in HTML, attributes are used to define the structure and content of a webpage.
This means that each attribute must uniquely identify a single instance of the entity, and no two instances of the entity can have the same value for the attribute. This ensures that the attribute can be used as a primary key, as it can be used to uniquely identify each instance of the entity.
To learn more about attribute
https://brainly.com/question/30487692
#SPJ4
To be fluent in computer language you must learn 8000 __________? (9 letter word)
Answer:
I believe its Algorithm
Explanation:
if u reading this ,DO THAT WORK
If an occupation is projected to decline by 7% over the next 10 years, how would you rate the job outlook? (6 points)
Average
Steady
Strong
Weak
Answer: Strong
Explanation:
Job outlook is simply refered to as a prediction of the change that'll occur regarding the number of people that'll be employed in a certain occupation based on a given number of years which can be three years, five years, ten years etc.
In a scenario whereby an occupation is projected to decline by 7% over the next 10 years, the job outlook would be rated as strong.
Does anybody know if I can get back deleted photos but the thing is I accidentally deleted my back up so is there any other way I can get it back without a back up??
Answer:
Explanation:
Here are some general tips that will help you recover deleted photos:
I am aware that you checked the back up however assuming your device has it Check the "Recently Deleted" or "Trash" folder
Use data recovery software: Data recovery software is available for a variety of operating systems, including Windows, macOS, Android, and iOS, and can assist you in recovering deleted photos. This app searches the storage of your device for evidence of deleted data and attempts to recover them.
If you are unable to retrieve your deleted images using software, you should consider hiring a professional data recovery agency. These services use specialized techniques and experience to recover data from a variety of devices and storage media.
Stop using the device immediately after realizing the photographs have been destroyed to avoid overwriting them and decreasing the possibilities of recovery. Take no new images or save any new data to the device until you've tried data recovery.
It should be understood that the success rate of restoring deleted photographs without a backup varies and is not guaranteed. It's always a good idea to back up your vital data on a regular basis to avoid losing photos in the future.
All the best, I hope you find your photos.
✌
help teacher said with complete explanation
Answer:
use the first graph to help you find out
NEED THIS ASAP!!!
Write a program to calculate the 4 basic arithmetic functions. Given two numeric inputs and an operation, have the program utilize an algorithm that will complete the function. Utilize if, else-if, and else statements efficiently for maximum credit.
good answers only please
number1 = float(input("Enter a number: "))
number2 = float(input("Enter a number: "))
operator = input("Enter the operator: ")
if operator == "+":
print("{} + {} = {}".format(number1, number2, (number1 + number2)))
elif operator == "-":
print("{} - {} = {}".format(number1, number2, (number1 - number2)))
elif operator == "*":
print("{} * {} = {}".format(number1, number2, (number1 * number2)))
else:
print("{} / {} = {}".format(number1, number2, (number1 / number2)))
I wrote my code in python 3. I hope this helps!
as discussed in class create database is similar to group of answer choices designing a closet organizer designing a car writing a story developing an app
The answer is designing a closet organizer, designing a car, writing a story, or developing an app. So, all the given options are correct,
A database is a collection of data stored on a computer that is structured in such a way that it can be easily accessed, managed, and updated by authorized personnel. A database management system (DBMS) is used to create and maintain databases, allowing users to query and manipulate the data stored within them.
The development of an app, on the other hand, is a process that involves the creation of software applications for use on mobile devices, computers, or other platforms. This involves designing, coding, testing, and deploying the app, as well as providing ongoing support and maintenance.
Both of these processes require careful planning, attention to detail, and a clear understanding of the needs of the users. In both cases, it is important to design the system in a way that is flexible, scalable, and easy to use, and to ensure that it is secure, reliable, and well-documented.
You can learn more about databases at: brainly.com/question/30634903
#SPJ11
Each webpage is assigned a(n) ________, an address that identifies the location of the page on the internet.
Each webpage is assigned a uniform resource locator (URL), an address that identifies the location of the page on the internet.
What is assigned to a webpage to identify its location?A URL (Uniform Resource Locator) is known to be a kind of a special form of identifier that is known to be used a lot to be able to find a resource on the Internet. It is known to be a term that is often called the web address.
Note that all webpage is assigned this address that identifies the place of the page on the Internet and a such, Each webpage is assigned a uniform resource locator (URL), an address that identifies the location of the page on the internet.
Learn more about webpage from
https://brainly.com/question/13171394
#SPJ1
Why are financial records important? How does keeping organized financial records contribute to successful money manageme?
Answer:
Financial records are very important for any organization. There are many reasons to keep records such as knowing financial situation, meeting tax obligations
Explanation:
Firstly is knowing the financial situation of the company which help to further contribute with organization.
Secondly organization meet the ta obligations assign by the government.
List two major problems that could be addressed by futuring.
Answer: Climate change and Economic Collapses
Explanation:
Not sure if this helps
Wireless vulnerability assessment begins with the planning, scheduling, and notification of all Internet connections, and is usually performed on the organization's networks using every possible approach to penetration testing. a. True b. False
Wireless vulnerability assessment begins with the planning, scheduling, and notification of all Internet connections, and is usually performed on the organization's networks using every possible approach to penetration testing: B. False.
Vulnerability assessment can be defined as a systematic analysis and review of any form of security weakness in an information system (IS).
Hence, vulnerability assessment is used to determine if an information system (IS) is susceptible (prone) to attacks from users within and outside the network.
On a related note, wireless vulnerability assessment involves the analysis and review of a wireless network to verify its level of security.
Hence, it begins with planning and scheduling of the assessment of the organization's networks using every possible approach to penetration testing, at regular intervals.
However, you shouldn't notify all Internet connections when conducting a wireless vulnerability assessment because it defeats the aim and objective of security assessment.
Read more: https://brainly.com/question/24112967
a_______helps us to see the relationship between different parts of data
Answer:
Data label........
..