how to get a cheap iphone

Answers

Answer 1

Answer:

Win a iphone or you can get spectrum for $19.99 a month

Explanation:

Your welcome and you're free to ask me anything when you need me!

Hope this helps!

-Kristy


Related Questions

__________ can collect information about credit card numbers.
a) Spyware
b) Virus
c)Trojan Horse
d) Worm​

Answers

Answer:

Spyware

Spyware collects your personal information and passes it on to interested third parties without your knowledge or consent. Spyware is also known for installing Trojan viruses. Adware displays pop-up advertisements when you are online.

Explanation:

Hope this helps !!

(Find the number of uppercase letters in a string) Write a recursive function to return the number of uppercase letters in a string using the following function headers: def countUppercase(s): def countUppercaseHelper(s, high): Write a test program that prompts the user to enter a string and displays the number of uppercase letters in the string.

Answers

def countUppercase(s):
count=0
for i in s:
if i.isupper():
count+=1
s=s.replace(i, "")
else:
s=s.replace(i, "")
countUppercase(s)
return count

element=input("Enter the string: ")
string=countUppercase(element)
print("\nNumber of upper letter in the string: ",string)

what is computer hardware part​

Answers

Answer:

Computer hardware includes the physical parts of a computer, such as the case, central processing unit, monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers and motherboard. By contrast, software is the set of instructions that can be stored and run by hardware.

Explanation:

Answer:

Computer hardware is the physical parts of a computer system that is visible.

The parts of computer hardware is Central processing unit, Monitor, Mouse, Keyboard, Computer data storage, Motherboard, Speakers and Mouse.

Hope that helps. x

Write code that assigns bigValue with the return value of calling the function GetBiggestValue passing number1 and number2 as arguments (in that order). Then, assign bigValue with the return value of calling GetBiggestValue passing bigValue and number3 as arguments (in that order).

Answers

Code:

Function GetBiggestValue(integer value1, integer value2) returns integer result
if value1 > value2
result = value1
else
result = value2

Function Main() returns nothing
integer userVal1
integer userVal2
integer userVal3
integer bigValue

userVal1 = Get next input
userVal2 = Get next input
userVal3 = Get next input

bigValue = GetBiggestValue(userVal1, userVal2)
bigValue = GetBiggestValue(bigValue, userVal3)

Put "Max value: " to output
Put bigValue to output

All Office programs have similar commands on the tab for changing the document view a. File b. View c. Locate d. display ​

Answers

Answer:

B. View

Explanation:

So you can eliminate "Locate" and "Display", since those do not exist on the Microsoft Word task bar.

Now you're left with File and View. File has everything to do with sharing and exporting your file, such as printing or saving it to your computer as a specific file.

With that being said, we're left with "B. View", which as you can see when you click it, presents many us with ways to view our document.

Good luck on your Microsoft Office/Word Certification!

What is the term for the action of Brazil imposing tariffs on US imports in response to the imposed tariffs by the U.S. on Brazilian exports to the United States ?

A. Reclaiming
B. Retaliation
C.retribution

Answers

I think the answer is B.

Making data secure means keeping it secret

Answers

Answer:

Data security refers to the process of protecting data from unauthorized access and data corruption throughout its lifecycle. Data security includes data encryption, hashing, tokenization, and key management practices that protect data across all applications and platforms.

Does technology always follow the science,yes or no explain why to choice

Answers

Answer:

No

Explanation:

because Technology does not always follow science but it may actually lead science in some instances. An example is weather forecasting.Again Mark me brainliest plz i really need it

What sound customization option would you use in Scratch to simulate a sound happening in a large, empty room (like a theater)?
louder
reverse
echo
slower

Answers

C. Echo ( I May Be Wrong )

Answer:

Louder

Explanation:

Write a program to test if an integer input from the keyboard is odd or even. Sample Run 1: Enter a Number: 78 Even Sample Run 2: Enter a Number: 17 Odd

Answers

Answer:

number = int(input("Enter a number: "))

if number % 2 == 0:

   print("Even")

else:

   print("Odd")

Explanation:

Currently taking python at school. On the last few lessons.

Which item would a small business most likely used to meet its daily operational needs ?

Answers

They could use a Budget software

Answer:

Commercial, ready-to-use software

Explanation:

business cards can be send to other outlook users as email attachments or........

Answers

Answer:

Hey man, here is the answer

Explanation:

The easiest route is Forwarding the existing conversation to another person. The previous thread will be quoted in the new message.

The method in the question appears to be for preserving the top-down reading structure of the existing thread, of which there is no way I'm aware of. Often times, the aforementioned method of simply forwarding an email is enough to impart some context to the person.

Alternatively, one might view the entire thread, and create a PDF of it (possible from the Print dialog box on a Mac, or to save as a PDF in the File/Edit menus in certain windows applications), which they could then send in an email.

Explain network optimization challenges of internet providers.

Answers

Answer:

The internet was initially used to transfer data packets between users and data sources with a specific IP adress.Due to advancements,the internet is being used to share data among different small,resource constrained devices connected in billions to constitute the Internet of Thing (IoT).A large amount of data from these devices imposes overhead on the (IoT) network.Hence,it is required to provide solutions for various network related problems in (IoT) including routing,energy conservation,congestion,heterogeneity,scalability,reliability quality of service (QoS) and security to optimally make use of the available network.In this paper,a comprehensive survey on the network optimization in IoT is presented.

The problem below uses the function get_numbers() to read a number of integers from the user. Three unfinished functions are defined, which should print only certain types of numbers that the user entered. Complete the unfinished functions, adding loops and branches where necessary. Match the output with the below sample:


Enter 5 integers:

0 5

1 99

2 -44

3 0

4 12

Numbers: 5 99 -44 0 12

Odd numbers: 5 99

Negative numbers: -44

Answers

size=6

def get_numbers(num):
numbers = []
print('Enter %s integers:' % num)

for i in range(0,num):
print(i,end=' ')
user_input = int(input())
numbers.append(user_input) # Add to numbers list
return numbers

def print_all_numbers(numbers):
# Print numbers
print('\nNumbers:',end=' ')
for i in range(0,len(numbers)):
print(numbers[i],end=' ')

def print_odd_numbers(numbers):
# Print all odd numbers
print('\nOdd numbers:',end=' ')
for i in range(0, len(numbers)):
if numbers[i]%2!=0:
print(numbers[i], end=' ')


def print_negative_numbers(numbers):
# Print all negative numbers
print('\nNegative numbers:',end=' ')
for i in range(0, len(numbers)):
if numbers[i] <0:
print(numbers[i], end=' ')

nums = get_numbers(size)
print_all_numbers(nums)
print_odd_numbers(nums)
print_negative_numbers(nums)

What is information technology in relation to computers

Answers

Answer:

Information technology (IT) is the use of any computers, storage, networking and other physical devices, infrastructure and processes to create, process, store, secure and exchange all forms of electronic data. ... The commercial use of IT encompasses both computer technology and telecommunications.

Answer:

Information technology (IT) is the use of any computers, storage, networking and other physical devices, infrastructure and processes to create, process, store, secure and exchange all forms of electronic data.

Explanation:

Hope this helps

8. Assuming str(rate) is "7.25," what output would be produced by the following snippet:
print("The hourly parking rate is $." + str(rate))


O "The hourly parking rate is $7.25"

O "The hourly parking rate is $ 7.25"

O "The hourly parking rate is $." "7.25"

O The print comfwand would fail because the rate is an integer, not a string,

Answers

The output would be "The hourly parking rate is $7.25"

The question is an example of concatenation.

Concatenation is an operation in computer programming in which a string is added to another string with the binary operation, '+' or '*'.

So, 'Frank' + 'Peter' concatenates as 'FrankPeter' and 'a' *3 concatenates as 'aaa'.

Since str(rate) is "7.25," which is a string, and the snippet is print("The hourly parking rate is $." + str(rate)), str(rate) will concatenate and be added to the expression "The hourly parking rate is $."

So, the output would be "The hourly parking rate is $7.25"

Note that since there is no space at the end of the first string, the second string is added to the first string directly without any spacing between the '$' sign and the '7'.

So, the output would be "The hourly parking rate is $7.25"

Learn more about concatenation here:

https://brainly.com/question/17031234

A company purchases a flood insurance policy for its data center. What is its risk

management decision?

1) Mitigation

2) Acceptance

3) Avoidance

4) Transference

Answers

When a company purchases a flood insurance policy for its data center, the risk management decision it took is: 4) Transference.

Risk management can be defined as a process which involves identifying, evaluating, analyzing and controlling potential risks (threats) that are present in a business, which can serve as an obstacle to its capital, revenues and profits.

Basically, risk management decision typically involves prioritizing cause of action or potential threats, so as to avoid, mitigate or transfer the risk that are likely to arise from such business decisions.

The risks or threats that are faced by a business firm can be transferred to a third-party such as an insurance agency, especially to protect its assets and resources in the event of a natural disaster such as flood, fire, earthquake, etc.

In conclusion, transference is a risk management decision that occurs when  a company purchases a flood insurance policy for its data center.

Read more on risk management here: https://brainly.com/question/13760012

Many subject elements make for simple and streamlined looking images. true or false

Answers

Answer:

Explanation:

false. many elements means a complicated picture, not a simple one.

The statement "Many subject elements make for simple and streamlined-looking images" is absolutely false.

What do you mean by Subject element?

The Subject element may be defined as the elements or components of the subject that are significantly responsible for constructing simple or complicated representations in the form of images.

It is a term or phrase that deals with the representation of fundamental topics on which a particular image relies. It significantly defines all the taxonomic attributes of the streamlined-looking images.

According to the context of this question, many subject elements will definitely lead to complicated and more streamlined images rather than simple ones.

Therefore, the statement "Many subject elements make for simple and streamlined-looking images" is absolutely false.

To learn more about Images elements, refer to the link:

https://brainly.com/question/26307469

#SPJ2

How many types of windows does Python use?



a.
four


b.
five


c.
one


d.
two

Answers

Question;

How many types of windows does python use?

Answer;

A.Four

Window does python use is Four

5. What is intellectual property? (1 point)
Brainliest if correct

Answers

Answer:

intangible property that is the result of creativity, such as patents, copyrights, etc.

Please mark as brainliest

Answer:

A creative work of an invention, designs or names and images used in commerce.

Make a Flow Chart From this C Programming Language Code

Answers

Answer:

1) Print message "Hello Everybody"

If you wish to print a simple message "Hello everybody" in a flowchart in c language, here is the example:

flowchart in c

2) Input 2 numbers from the user and print their sum

Imagine that you are a user who wishes to put in two numbers and want their sum to be printed. Here is a flowchart for structure in c which is required:

flowchart in c language

3) Input numbers from the user and check whether it is even or odd

If you wish to put in numbers and then check whether it is an even number or an odd one, the following flowchart of c language can significantly help.

flowchart for structure in c

4) Flowchart to find the sum of the first 50 natural numbers

Let’s first see how that will look in a flow chart, and then we see the same thing mapped to a C program. This shows you why it’s important to map out your algorithm to a flow chart before you start coding it.

flow charts in c,

The loop easily translates to a simple C for loop. In this program, we initialize the variable sum =0 and n=0. In the next step, we increment n by 1 and assign sum=sum+n. We check if n=50 and if not, increment n by 1. Else we just print the sum.  

5) C Program to find the Factorial Value of a Number

Now let’s look at a bit more complex example. First, we’ll draw out the flow chart for the factorial n.

flowchart of if statement in c,

6) Control Algorithm for cooking toast in the toaster

Using a flowchart describe the control algorithm that a toaster might use to cook toast. There will be a start button the user pushes to activate the machine. There is another input that measures toast temperature. The desired temperature is preprogrammed into the machine. The output is a heater, which can be on or off. The toast is automatically lowered into the oven when the heat is applied and is ejected when the heat is turned off.

flowchart in c

7) Calculation of the average of two numbers

If we have to calculate the average of any two given numbers, the following flowchart for structure in c will be made.

flowchart in c language

Explanation:

mark me brainlist pls

Read the problem listed below. Formulate a Decomposition or Outline of the problem. Determine if you have seen this problem before and how it was solved. Start to write your Algorithm, making note of the inputs and outputs that will be required. Write your code, test and debug.

Problem:
Create a program in Python that will draw a series of triangles. The program needs to ask the user for the number of triangles to draw and the size of the triangle.

The inputs for this program need to look like the following:

Enter the number of triangles:
Enter the size of the triangles:
Using these two inputs, your program will then draw a series of triangles in the size the user wishes.

For example if the user enters 3 triangles with a size of 5, the following will be the output:

*
**
***
****

*
**
***
****

*
**
***
****
The easiest way to solve this problem is with two loops. One loop draws the triangles and the other repeats the drawing.

When testing your program make sure you test with different sizes and different numbers of triangles as this will be how your code will be run by Codio.

Answers

URL where the media can be found;

the description of the type of media used in the example;

an analysis of the media piece in relation to the best practices discussed in this lesson, which answers these questions:

Does the piece illustrate best practices?

Which are best represented?

What point do you feel the company

There are two kinds of emotions: positive and negative. True False

Answers

Answer:

False

Explanation:

There are many emotions the human brain can experience

False is the answer to the question

reflection image and design

Answers

Explanation:

It is the image and design

The hardware and software that must be implemented to support the applications that the primary activities use are a part of the ________ activities.\

Answers

The answer is infrastructure

How often do domain controllers download Group Policy settings?

Answers

Answer:

Domain controllers download Group Policy settings -every five minutes-

Explanation:

hope I helped

what changes might you make to a circuit in order to slow the flow of electrical energy?

Answers

it’s gravity that’s what my teacher said

Answer: The resistor uses the energy of the electrons around the wire and slows down the flow of electrons.

Explanation:

Capstone Project part 11 quiz

What is the following code snippet checking? (1 point)
while response != "yes":

Othat response variable is not yet yes

O that response variable is yes

O if "yes" is indexed in an array for the variable "response"

O if the response variable is "no"



If you give all answers you will have an amazing Christmas!

Answers

It is checking if the response is not yet yes

What cable is used to connect devices together on a network?

Answers

Answer:

Ethernet crossover cable

Explanation:

.

A certain microprocessor requires either 2, 4, 8, 12, or 16 machine cycles to perform various operations. Seventeen and one-half (17.5) percent of its instructions require 2 machine cycles, 12.5% require 4 machine cycles, 35% require 8 machine cycles, 20% require 12 machine cycles, and 15% require 16 machine cycles. What is the average number of machine cycles per instruction for this microprocessor

Answers

The answer is 8.45

since (17.5*2+12.5*4+35*8+20*12+15*16)/100 = 8.45
Other Questions
What are the connotative meanings of sighing Whats the an and the a10 What do you think will happen to the Sun when all the hydrogen in it fuses to become helium? Write the equation of the line that is perpendicular to y=3x-6 and passes through the point x, y(2,0) Perpendicular is the negative reciprocal so the slope is -1/3Need to know b and the full equation With work please. Thank you! I need help find the value of x which characters mother was captain of hogwarts gobstones club? What stress causes this type of fault to form? compression gravity tension shearing. T is the midpoint of RS, T has coordinates (6, 4), and S has coordinates (3,-2). What are thecoordinates of R? OMG HELP RN I GIVE BRAINLIST Which of the following correctly describes the solutions to the inequality? A. There are 5 solutions. The solutions are the numbers between 4 and 8. B. There are an infinite number of solutions. The solutions are all numbers less than 3. C. There are 6 solutions. The solutions are the numbers between -2 and 3. D. There are an infinite number of solutions. The solutions are all numbers greater than 3. A rule for creating a pattern is given below.Rule: Subtract 7 from 2 to get y.Which ordered pair, (x, y), works for the rule? Click on the box to indicate the correct order of procedures to deal with a heat related illness. First: second: third: fourth: fifth:. 0.1216 gwireAllgof20 mL of 1M HClneutralized by addition of 50 mL of 0.20 M NaoHFind the Atomic mass of Mg ?addedmagnisium was addedthe excessacidwas The oxygen atoms in the thermosphere absorb high-energy solar radiation and convert it into heat energy.truefalse "Jack had a knack for packing picnic baskets with great food." Which of the following goods would be included in the calculation of gross domestic product? select the two correct answers. Why did nationalism thrive in period of 1750-1900? Find the volume of a cone with a diameter of 12.9 cm and a height of 16.6 cm. What is the opposite number of -5.23 If you have a choice to earn simple interest on $10,000 for three years at 8% or annually compounded interest at 7. 5% for three years which one will pay more and by how much?. groundhog day was inspired by what february christian holiday?