She can't part.....her jewels.​

Answers

Answer 1

Answer:

She can't part with her jewels.

Explanation:

:))))


Related Questions

The illegal copying of program​

Answers

Answer:Software piracy

Explanation:

What is design reference threat

Answers

it’s a threat ‘make it spicey’ so with design

What happens when a string doesn’t include the separator that’s specified in the parameter of the split() method?

Answers

Answer:

Nothing

Explanation:

If a seperator value is provided as an argument within the split() method and the string does not include that value then the string will remain the same and will not be split. If no value is provided as an argument within the split() method, then the string that the method is being applied to will automatically be split in every space character (" ") that exists within it. This is the default value of split() when no argument is passed to it.

Can you sort by reading the string in reverse in python?

Answers

Explanation:

# Let our string is brainlycom

Main = "brainlycom"

# First we will print the original string.

print("The original string : " + str(Main))

#Now Reverse Sort a String

Reverse_Sort= ''.join(sorted(Main, reverse=True))

print("String after reverse sorting : " + str(Reverse_Sort))

After running the above code you will get the result:

The original string : brainlycom

String after reverse sorting : yronmlicba

In REPL.it, the interface includes an Editor and an Interpreter.
True
False

Answers

Answer:

Its true.

Explanation:

The _____ Tag surrounds all content that will be visible on your web page for all to users to see on that website.

Answers

Answer:

The body tag

Explanation:

HTML has several tags; however, the tag that handles the description in the question is the body tag.

It starts with the opening tag <body> and ends with closing tag </body>

i.e.

<body>

[Website content goes in here]

</body>

Any text, image, object etc. placed within this tag will be displayed in the website

A production house needs an operating system that captures, saves, and generates information within specific time. Which type of operating system should the production house choose?

Answers

Answer:

A real-time operating system

Explanation:

An operating system is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes.

This ultimately implies that, an operating system acts as an interface or intermediary between the computer end user and the hardware portion of the computer system (computer hardware) in the processing and execution of instructions. Some examples of an operating system on computers are QNX, Linux, OpenVMS, MacOS, Microsoft windows, IBM, Solaris, VM etc.

There are different types of operating systems (OS) based on their functions and these includes;

I. Simple Batch System.

II. Multiprocessor System.

III. Desktop System.

IV. Multiprogramming Batch System.

V. Distributed Operating System.

VI. Network System.

VII. Realtime Operating System.

In this scenario, a production house needs an operating system that captures, saves, and generates information within specific time. Therefore, the type of operating system that the production house should choose is a real-time operating system.

A real-time operating system can be defined as an operating system (OS) that provides services to a system as they are required, without any form of delay or buffering of data.

Buying a new computer for which of these reasons is most likely a sound
financial decision?
A. You liked the ad for it on TV.
B. You need it to do your homework.
O c. Your friend has one.
D. You were persuaded by a salesperson.

Answers

Answer:

b. you need it to do your homework

Explanation:

please help me



Match the technology with the appropriate task.



1. graphics software

2. word processor

3. CAD

4. laptop

5. GPS​

Answers

Complete Question:

Match the technology with the appropriate task.

Column A

1. Graphics software

2. Word processor

3. CAD

4. Laptop

5. GPS

Column B

A. Create a company logo.

B. Get directions to a customer’s office.

C. Type a report.

D. Complete many types of tasks on a computer away from the office.

E. Design a building.

Answer:

1. A

2. C

3. E

4. D

5. B

Explanation:

1. Graphics software: it can be used to create a company logo. Some examples of software applications or programs are Adobe photoshop, Core-draw, illustrator etc.

2. Word processor: it is typically used for typing a text-based document. For instance, type a report. Some examples are notepad, Microsoft Word, etc.

3. CAD: design a building. CAD is an acronym for computer aided design used for designing the graphical representation of a building plan. An example is Auto-CAD.

4. Laptop: complete many types of tasks on a computer away from the office. A laptop is compact and movable, so it can be easily used in any location.

5. GPS: directions to a customer’s office. GPS is an acronym for global positioning system and it is typically used for locating points and directions of a place.

Answer:

1. A

2. C

3. E

4. D

5. B

The distance a vehicle travels can be calculated as follows: distance = speed * time For example: If a train travels 40 miles per hour for 3 hours, the distance traveled is 120 miles.Write a program that asks the user for the speed of a vehicle (in miles per hour) and how many hours it has traveled. The program should use a loop to display the distance the vehicle has traveled for each hour of the time period.

Answers

Answer:

In Python:

speed = float(input("Speed: (mile/hr): "))

time = int(input("Time: (hr): "))

for hour in range(1,time+1):

    distance = speed * hour

    print("Distance: "+str(speed)+"*"+str(hour)+" = "+str(distance))

Explanation:

This prompts the user for speed in mile/hr

speed = float(input("Speed: (mile/hr): "))

This prompts the user for time in hr

time = int(input("Time: (hr): "))

This iterates through the input time

for hour in range(1,time+1):

This calculates the distance covered in each hour

    distance = speed * hour

This prints the distance covered in each hour

    print("Distance: "+str(speed)+"*"+str(hour)+" = "+str(distance))

What stores all software and files on your computer and reads and writes data onto a spinning magnetic or optical disk?

Answers

Answer:

Depends. could be an external opticial drive, a scuzi drive, a real to real tape system, or just a simple electromagnetic hard drive with speeds of 1000 rpm or more

What will the output of the statements below? System.out.println(9%2); System.out.println(12%6); The output of the first statement is * The output of the second statement is​

Answers

Answer:

You get Exact 30 print of that sentence on a comadore 64

Explanation:

Just simple basic science. hope this helps

how do u mark brainlyest on the computer

Answers

Answer:

Explanation:

An answer on Brainly can only be marked as Brainliest if the individual who answered the question is not yourself, and if one week has passed since the answer was posted. Once the week has passed and the answer is still there (has not been removed) then a Brainliest button should appear that will allow you to mark the answer as Brainliest. Simply click the button and the answer will be marked as Brainliest.

NEED HELP WILL MARK BRAINLIEST AND 25 POINTS FOR ANSWER Which section available in the Design view for the form actually includes the record data itself?

header

footer

detail

Overview

Answers

Answer:

the answer is detail

Explanation:

please it's detail

The Design view for the form actually includes the record data itself will be known as Overview.

What is a detail?

If the file is completed, then all the record that was done during completing the file will be mentioned in the section known as detail.

The Design view for the form actually includes the record data itself will be known as detail.

Then the correct option is D.

More about the detail link is given below.

https://brainly.com/question/9208069

#SPJ2

Which 3 statements are true about journal entries? (Quick Books)

(Select all that apply)

1.Total debits must equal total credits

2.You can post to Products and Services in a journal entry

3.When posting to the accounts receivable account, you must specify a vendor

4.When posting to the accounts receivable account, you must specify a customer

5.You can post to multiple accounts receivable and/or accounts payable accounts in the same journal entry

Answers

Answer:

1.Total debits must equal total credits

4.When posting to the accounts receivable account, you must specify a customer

5.You can post to multiple accounts receivable and/or accounts payable accounts in the same journal entry

Explanation:

1.

A Journal entry follows the concept of double-entry. In the double-entry principle, a debit entry equals a credit. After posting all the required entries total debits are equal to the total credits.

4.

The business makes sales to customers. Some sales are made on cash or some are made on credit. In the case of credit sales, the receivables are made. To record the credit sale entry we must specify the customer in the debit entry against the credit entry of sales.

5.

in recording the credit sales or purchases multiple receivable or payable accounts can be used and a single entry of sales of purchases can be posted against these accounts. For example

Journal Entry with multiple receivables accounts.

DR. Customers A $1,000

DR. Customers B $2,000

DR. Customers C $3,000

CR. Sales ______$6,000

The three statements that are true about journal entries are:

Total debits must equal total credits.When posting to the accounts receivable account, you must specify a customer.You can post to multiple accounts receivable and/or accounts payable accounts in the same journal entry

According to the question, we are to discuss about journal entries which is used in financial accounting.

As a result of this we can see that in journal entries When posting to the accounts receivable account, you must specify a customer.

Therefore, in journal entries Total debits must equal total credits.

Learn more about journal entries at;

https://brainly.com/question/25372704

what type of device is a projector ?
a. input
b. memory
c. output
d. storage

Answers

Answer:

output

Explanation:

if I'm wrong sorryyy

Answer:

Output

Explanation:

:D

The ______ clause allows us to select only those rows in the result relation of the ____ clause that satisfy a specified predicate.

Answers

Answer:

1. Where,

2. From

Explanation:

In SQL query language when working on a database, a user can use certain clauses to carry out some functions.

Hence, The WHERE clause allows us to select only those rows in the result relation of the FROM clause that satisfy a specified predicate.

This is because the "Where clause" selects the rows on a particular condition. While the "From clause" gives the relation which involves the operation.

WHat is 100 digits of pi?

Answers

Answer:

3.1415926535 8979323846 2643383279 5028841971 6939937510 5820974944 5923078164 0628620899 8628034825 3421170679

Answer:

And now

AsapSCIENCE presents-

100 digits of π

3.14159, this is π

Followed by 2-6-5-3-5-8-9

Circumference over diameter

7-9, then 3-2-3

OMG! Can't you see?

8-4-6-2-6-4-3

And now we're on a spree

38 and 32, now we're blue

Oh, who knew?

7, 950 and then a two

88 and 41, so much fun

Now a run

9-7-1-6-9-3-9-9

Then 3-7, 51

Half way done!

0-5-8, now don't be late

2-0-9, where's the wine?

7-4, it's on the floor

Then 9-4-4-5-9

2-3-0, we gotta go

7-8, we can't wait

1-6-4-0-6-2-8

We're almost near the end, keep going

62, we're getting through

0-8-9-9, on time

8-6-2-8-0-3-4

There's only a few more!

8-2, then 5-3

42, 11, 7-0 and 67

We're done! Was that fun?

Learning random digits

So that you can brag to your friends

Explanation:

When looking at security standard and compliance, which three (3) are characteristics of best practices, baselines and frameworks

Answers

Answer:

In order to observe best practices, and to meet with technical and other requirements, organizations often use frameworks for cybersecurity compliance and regulatory compliance. These frameworks provide best practices and guidelines to assist in improving security, optimizing business processes, meeting regulatory requirements, and performing other tasks necessary to achieve specific business objectives such as breaking into a particular market niche or selling to government agencies.

Many such frameworks exist, and the recommendations set out in them can impose difficult and often expensive demands on enterprise resources – especially in situations where an organization is subject to a number of regulatory compliance regimes, whose requirements it has to meet while maintaining its own strong cybersecurity status.

Explanation:

A message of length 8x106bits is to be sent from host A to host B, routed through 2 packet switches. The transmission capacity of each of the three linksis 2 Mbps. Ignoring propagation, queuing and processing delay, how long will it take to move the message as a single packet from host A to host B assuming each packet switch uses store-and-forward switching

Answers

Answer:

Time from source host to 1st packet switch = 4 secs

Total time = 12 secs

Explanation:

Solution:

Message Length = [tex]8 x 10^{6}[/tex] bits

Each link is = 2Mbps

Assumption:

Each packet switch uses store - and - forward switching

So, in order to calculate the total time taken to move the message as a single packet from host A to host B with the above assumption, first we need to calculate the time required to sending message from source host to 1st packet switch.

For that,

we need to divide Length of the message to Transmission capacity of each link.

Time from source host to 1st packet switch = 8/2

Time from source host to 1st packet switch = 4 secs

Now, to calculate the total time taken till the destination = 4 x 3 hops

Total time = 12 secs

What are the two basic literary forms?

Answers

fiction and nonfiction

Modify your program from Learning Journal Unit 7 to read dictionary items from a file and write the inverted dictionary to a file. You will need to decide on the following: How to format each dictionary item as a text string in the input file. How to covert each input string into a dictionary item. How to format each item of your inverted dictionary as a text string in the output file. Create an input file with your original three-or-more items and add at least three new items, for a total of at least six items.

Answers

Answer:

Following are the code to this question:

import ast as a #import package ast

d1= {}#defining an empty dictionary  

def invert_dictionary(d1):#defining a method invert_dictionary

   i = dict()#defining variable i that hold dict method  

   for k in d1:#defining for loo to check dictionary value

       val = d1[k]#defining val variable to holds dictionary key values

       for val1 in val:#defining another for loop to hold value of dictionary and inverse it

           if val1 not in i:#defining if block to check value

               i[val1] = [k]#hold key value

           else:#defining else block

               i[val1].append(k)#add value in dictionary

   return i#return inverse value

with open("dict_items.txt", "r") as data:#use open method to add a list as a file

   dict_item = a.literal_eval(data.read())#defining a variable that covert item as a text string in the input file  

   '''covert input string into dictionary item'''

   e_val = input("Please enter a value")#defining variable e_val to input value

   dict_item['4']=str(e_val)#holding value in dictionary

   dict_item['5']='e'#holding value in dictionary

   dict_item['6']='f'#holding value in dictionary

   '''Invert the dictionary value '''

   invert_data =invert_dictionary(dict_item)#defining variable to holding method value

'''calculating the format of each item of inverted dictionary as a text string output file.'''

f_data = {i:str(j[0]) for i,j in inverted_data.items() }#defining f_data to hold coverted value

import json as j#import package

with open('out_put.txt', 'w') as file:#use open method to open file

   file.write(j.dumps(f_data))#add value

Explanation:

In the above-given code has four parts which can be defined as follows:

In the first part, a method invert_dictionary is defined that accepts a dictionary, and defines two for loops in which the second loop uses a conditional statement to convert the inverse form and return its value, and after inverse it use the open method to add a list as a file, and defining a variable that covert item as a text string in the input file.

In the second step, a variable e_val is declared for input value , and use the dict_item variable to holding dictionary  value, and call the method and hold its value.

In the third and fourth step it calculating the format of each item of inverted dictionary as a text string output file.

What symptom will be exhibited on an engine equipped with a pneumatic governor system if the cooling fins are clogged? Not Plugged But Clogged?

Answers

Engine speed will rise

Universal Container wants to understand all of the configuration changes that have been made over the last 6 months. Which tool should an Administrator use to get this information

Answers

Answer:

Set up audit trail

Explanation:

The administrator should set up an audit trail in order to get this information.

An audit trail would give him the record of all the configuration changes that have been made in a file or a database in the last 6 months.

Audit trails can be manual or electronic. It provides history and also documentation support. It can authenticate security and also help to mitigate challenges.

4. What is the package name in which the Scanner class resides?

Answers

Related Articles. Scanner is a class in java. util package used for obtaining the input of the primitive types like int, double, etc. and strings.

What does this icon mean?
Plz hurry it’s for a school quiz you will get a brainly

Answers

Answer:

Filter data

Explanation:

If u dont believe me here is a pic

What are the three general methods for delivering content from a server to a client across a network

Answers

Answer:

Answered below.

Explanation:

The three general methods consist of unicasting, broadcasting and multicasting.

Casting implies the transfer of data from one computer (sender) to another (recipient).

Unicasting is the transfer of data from a single sender to a single recipient.

Broadcasting deals with the transfer of data from one sender to many recipients.

Multicasting defines the transfer of data from more than one sender to more than one recipients.

Wrtie down some containerization technology.

Answers

Answer:

Some containerization technologies are listed as follows: Docker, Docker Enterprise, Amazon Elastic Container Service, Container Linux, Amazon's AWS, Microsoft's Azure Container, etc.

Explanation:

Containerization technology is a computer technology that packages software codes and their dependencies in isolated user spaces called containers so that the software can run uniformly and consistently on any infrastructure, using a shared operating system.  It is the modern alternative and companion to virtualization.  In simple terms, containerization is the process which packages an application with the required libraries, frameworks, and configuration files so that it can efficiently run in various computing environments.

Write pseudocode for washing a car using at least five steps.

Answers

Answer:

#include <iostream>

int main()

{

bool carWashed{ 0 };

bool washCar{ 0 };

while(carWashed == 0)

{

 washCar();

}

if(washCar == 1)

{

carWashed{ 1 }

}

}

Explanation:

c++

Which of these devices collects the most information on network activity?

a. Intrusion detection systems.
b. System Event Management systems.
c. Firewalls.
d. Packet sniffers.

Answers

Answer:

The devices collects the most information on network activity are:

d. Packet sniffers.

Explanation:

Generally, a packet sniffer is a monitoring device which examines streams of data packets that flow between computers on a network and the larger Internet.  One of the best packet sniffers is the Wireshark.  As a packet sniffer, the Wireshark is also an analysis tool.  It captures network traffic on local networks, storing the obtained data for offline analysis.

Other Questions
URGENT!!need answer asap Explain and Show the equation of line perpendicular to y=-1x+2 going through the point (6, 3) CAN SOMEONE PLEASEEE HELPPPP ME WITH THIS!!!!! Help pls and thank you:) which of the following is not one of the five pillars of islam A. fast during RamadanB. belief in the holy trinityC. pray five times a dayD. give charity to the poor and needy Its in the picture please and thank you ^* What is the equation in pointslope form of the line passing through (3, 4) and (0, 2)?Use the table below to answer this question:x y021126Find the average rate of change for the given function from x = 0 to x = 2. what is the nearest whole percent of 40 The starting annual salary for an office worker at a company is $29,000. If the companyawards an annual increase of 6.2%, which graph models this situation after the office workerreceives x annual increases?Office Worker's Salary help need answer asap !! HELP ME DO AT 11;59( PLEASE HELP ME Suppose an exponential function, f(x), models the amount of money in a savings account after x years. What is the most appropriate domain of this function?A. real numbersB. rational numbersC. positive integersD. positive rational numbers The parabola y = x^2 is shifted up by 7 units and to the left by 1 unit. What is the equation of the new parabola? Evaluate the evolutionary benefits of regulating an internal variable, such as body temperature, versus the cost. Please help me with this Its kind of frustrating what should be the basis for dividing county into province. Which of the following foods were added to Europeans diets as a result of the discovery of the New World?apples, pears, plumbsbeef, pork, chickentomatoes, corn, potatoeslemons, limes, oranges The Myceneans people always have a surplus of food because of their efficient farming techniques. true or false Question 3 of 18Which sentence most clearly describes a theme?O A. Dialogue reveals the character's attitude.O B. The heart is a common symbol for love.O C. Harry Potter finally becomes a wizard.O D. True friends are there during a crisis. Which word fits in both sentences? When we go fishing, we ______ our boat.TV viewers listened as the ______ told the news.Attach, anchor, announcer, fasten