You created a two-dimensional array with the following code.

>>> A = [21, 'dog', 'red']
>>> B = [35, 'cat', 'blue']
>>> C = [12, 'fish', 'green']
>>> E = [A, B, C]
How do you refer to 'cat'?

E[1, 2)

E[1,2]

E[1][2]

E[1,2]

Answers

Answer 1

Explanation:

My answer is E[1][1]

but I don't see it here

Answer 2

Answer:

E[1][2] that is correct I just took t


Related Questions

Application software consists of programs that perform a specific task for users. Examples include microsoft word internet explorer and micro type 5.

A.true
B.false​

Answers

Answer: verdadero

Explanation:

In Outlook 2016, the Tell Me function can be accessed by
O pressing F1 on the keyboard.
clicking on the File tab, then the question mark button.
typing a query in the textbox on the ribbon.
typing "help" in the search box in the message pane.

Answers

In Outlook 2016, the Tell Me function can be accessed by

O pressing F1 on the keyboard.

clicking on the File tab, then the question mark button.

typing a query in the textbox on the ribbon.

typing "help" in the search box in the message pane.

Explanation:

I think it should be typing a query in the textbox on the ribbon.

In Outlook 2016, the Tell Me function can be accessed by clicking on the File tab, then the question mark button. The correct option is B.

What is Outlook?

The preferred email client for sending and receiving emails from Microsoft Exchange Server is Microsoft Outlook. Accessibility to contact, email, calendar, and task management tools is also provided by Outlook.

You can send and receive emails, manage your calendar, save the names and phone numbers of your contacts, and keep track of your projects using Outlook.

Even if you utilize Outlook on a daily basis, you might not be aware of all the wonderful things it can do to boost your productivity.

By selecting the File tab, then the question mark button in Outlook 2016, you may open the Tell Me feature.

Thus, the correct option is B.

For more details regarding Microsoft outlook, visit:

https://brainly.com/question/26695071

#SPJ2

a man takes 30 step to cover 18 metre l,how many step he will needed to cover 3003m distance​

Answers

he will need to take 5,004 steps to cover 3003m distance
3003/18=166.8
166.8 x 30=5004
Answer is 5004

Merle wants to change the formatting of all bold cells to be non-bolded. Shania wants to copy the cell color,
border, and font from cell E12 to all of column D. Which best describes what each person should do?

A. Merle should use Find and Replace, and Shania should use the Format Painter.

B.Merle should use the Rules Manager, and Shania should use Find and Replace.

C.Merle should use the Format Painter, and Shania should use the Rules Manager.

D. Merle should use the Format Painter, and Shania should use Find and Replace.

Answers

Answer:

Merle should use Find and Replace, and Shania should use the Format Painter.

Explanation:

It's the most logical to me.. And that's what I'm gonna do on my test. =) hope it helps.

Explicar en qué sectores están divididos los procesos de producción y su importancia para el desarrollo tecnológico y económico del país. Indique dos ejemplos en cada sector

Answers

Answer:

Un sector económico es una rama de la economía en específico, caracterizada por englobar dentro de sí una serie de actividades interrelacionadas según cómo cada una contribuye al desarrollo económico del país. Una clasificación general popular de la economía es la división en los siguientes cuatro sectores:

1) Sector primario. El sector primario es el sector económico que abastece de materias primas y alimentos. Este sector abarca los sectores de agricultura, ganadería, caza, pesca y extracción de minerales. El procesamiento de estas materias primas se realiza en el sector secundario.

2) Sector secundario. Este sector se conoce como industria. Esto incluye todas las empresas y actividades que procesan las materias primas del sector primario. Los productos suelen ser revendidos al consumidor por el sector terciario.

3) Sector terciario. Este sector incluye los servicios comerciales: empresas que quieren obtener ganancias vendiendo sus servicios. El sector terciario incluye tiendas, catering, teatros, peluquerías, mayoristas, empresas de transporte, arrendadores, agencias de empleo, contables, abogados, consultores y empresas TIC.

4) Sector cuaternario. El sector cuaternario es el de servicios no comerciales, el único sector económico sin ánimo de lucro. Este sector incluye los servicios gubernamentales y los servicios subvencionados por el gobierno. Los ejemplos son hospitales, hogares de ancianos, cuerpos de bomberos, defensa, salud, trabajo social, educación y cultura.

Answer:

hola

Explanation:

HEEEEELPPP!!!BRAINLIEST!!! THIS IS URGENT!!!

Read the following code:

count in range(80):
leo.forward(count * 2)
leo.left(count + 2)

There is an error in the for loop. What should be fixed?

Add a colon to the end of the statement
Begin the statement with the proper keyword to start the loop
Place the loop condition outside the parentheses
Replace the parentheses around the range with quotation marks

Answers

Answer:

Begin the statement with the proper keyword to start the loop

Explanation:

Given

The code segment

Required

Fix the code

The first line of the code segment is meant to be a for loop, but it does follow the right syntax.

This is so because the for keyword is missing.

The first line should be corrected and replaced with:

for count in range(80):

Hence, option (b) is correct

I need to calculate the % of Grand Total on Microsoft Excel, but can't for the life of me remember how to do that. Help would be greatly appreciated.

PS: Reposting my question because the answers I got previously were both only made for points, not to help in any way. :(

Answers

Answer:

You need to first use the Sum function to add up all the costs of September.

Then divide each September cost by the grand total that you got. After that format the last column to be percentages.

Look at the attached file for the formulas used.

Help brainliest True or False

In Python, the first character in a string has an index position of one.
TRUE/False

Answers

Answer:

False

Explanation:

Hope this Helps! :)

Answer:

False

Explanation:

The first character in the string has an index of 0

What is the role of the connection medium?

Answers

wth does that mean?!

Please help w/ Java, ASAP!!!!

Answers

Answer:

B

Explanation:

When you have a method that is copying values from one array into another, you first have to initialize a new array which you can copy the values into. This is done by using the provided value "count".

   int [ ] nums = new int [count];

Second, you have a "for each" loop that iterates over each index in the first array, and assigns the value at that index to the same index location in the copy array. In a "for each" loop, the variable "val" represents the content of an index, not an iterated value itself. This is why we can just do this inside the loop:

  nums[ j ] = val;

That said, you still need "j" to be there and increment because we still need a tracking value for the current index in the copy array.

   int j = 0;

   for (int val: array)

   {

     copyArray[j] = val;

    j++;

   }

Third, you return the copy version of the array.

return nums;

Source:

I am currently a second year Java student.

Three different numbers need to be placed in order from least to greatest. For example, if the numbers are ordered 9, 16, 4, they should be reordered as 4, 9, 16. Which of the following algorithms can be used to place any three numbers in the correct order?
If the first number is greater than the last number, swap them. Then, if the first number is greater than the middle number, swap them.

If the first number is greater than the last number, swap them. Then, if the first number is greater than the middle number, swap them.
A

If the first number is greater than the middle number, swap them. Then, if the middle number is greater than the last number, swap them.

If the first number is greater than the middle number, swap them. Then, if the middle number is greater than the last number, swap them.
B

If the first number is greater than the middle number, swap them. Then, if the middle number is greater than the last number, swap them. Then, if the first number is greater than the last number, swap them.

If the first number is greater than the middle number, swap them. Then, if the middle number is greater than the last number, swap them. Then, if the first number is greater than the last number, swap them.
C

If the first number is greater than the middle number, swap them. Then, if the middle number is greater than the last number, swap them. Then, if the first number is greater than the middle number, swap them.

Answers

Answer:A

Explanation:

List and describe 3 parts (often referred to as 'elements') of a web page?

Answers

Answer:

Content

Design

Development

Explanation:

The design and management of sites is internet explorer; it is the research that takes place over time to make a site look fantastic, work quickly and function well with a smooth user interface.

A histogram titled Greeting card sales has date on the x-axis and cards (millions) on the y-axis. January is 1 card, February: 11, March: 1, April: 1, May: 9, June: 7, July: 1, August: 1, September: 1, October: 9, November: 7, December: 12. The histogram shows the monthly sales for a greeting card company in one year. Which best describes the data for May–June and October–December? clusters no frequency gaps symmetry

Answers

Answer:

Clusters

Explanation:

Given

The histogram

Required

What does May-June and October-December represents

The data for May-June is:

[tex]May: 9[/tex]

[tex]June: 7[/tex]

For October-December, it is:

[tex]October: 9[/tex]

[tex]November: 7[/tex]

[tex]December: 12[/tex]

Notice that these data are close to each other.

This implies that they are clusters

Answer:

the answer is a

Explanation:

.Explain how encrypting data during transmission protects it from being read by an unauthorised person who intercepts the transmission.

Answers

Answer:

Encryption is an effective and efficient technique used to prevent unauthorized access to informations transmitted over the internet.

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

SSL/TLS are standard protocols that provides link encryption for the transmission of messages over the internet such as electronic mail (e-mail).

SSL is an acronym for Secured Socket Layer and it is one of the secured way of authenticating and encrypting data between a computer and the mail server.

In the case of TLS, it is an acronym for Transport Layer Security and it basically is used for providing authentication and encryption of data between two communicating systems on a network.

This ultimately implies that, SSL/TLS are standard network protocols that provides data integrity and privacy to users when communicating over the internet or networking devices as they're made to encrypt user credentials and data from unauthorized access. The SSL/TLS are an application layer protocol used for the encryption of mails sent over the internet, in order to protect user information such as username and password.

Identify and summarize the features of the Windows 7 backup utility.

Answers

Answer:it is slow

Explanation: slow

Answer:

IT can create a backup it can restore a backup and probably more

Explanation:

HELP!!!!!!!!!!!

A program that converts a program to binary all at once and runs the entire program when finished with the conversion
Group of answer choices

Complication

Compiler

Function

No answer text provided.

Answers

Answer: Compiler

Explanation:

a deque is a type of collection,but it is not automatically available when you open IDLE. What is missing that allows you to use the deque class?

Answers

Answer:

Import

Explanation:

The import instruction does what it sounds like it imports a file class from file function from file it's very flexible.

The import instruction does what it sounds like it imports a file class from file function from file it's very flexible.

What is Import instructions?

When you transition to Shopify from another platform or need to make several adjustments to your products or inventory, importing products into your Shopify store using a CSV file might be helpful.

The data from the CSV file is transformed into products when you import products, and you can choose whether to publish your new products to all sales channels or only your web store.

You have the ability to overwrite any existing goods with the same handle when importing a CSV file. For any columns that are absent, the current values will be used.

Therefore, The import instruction does what it sounds like it imports a file class from file function from file it's very flexible.

To learn more about CSV file, refer to the link:

https://brainly.com/question/29242949

#SPJ2

Consider the following code: x = 5 x = x * 3 print (x) What is output

Answers

Answer:

Output: 5

Explanation:

It will print 5 on the screen

What should you do first when designing a program?

Answers

Answer: talk about da progrm

Explanation:

Answer:

Step-by step Explanation:

Which of the following programming languages were initially developed to teach programming techniques to students? Choose all that apply.

Answers

Answer:

BASIC programming language

Pascal programming language

Explanation:

C++ programming language

Java programming language

BASIC programming language

Pascal programming language

Answer:

it's C and D

Explanation:

A shop will give discount of 10% if the cost of purchased quantity is more than 1000. Ask user for quantity suppose, one unit will cost 100. Judge and print total cost for user.

Answers

Answer:

The program in Python is as follows:

qty = int(input("Quantity: "))

price = 100 * qty

if qty >1000:

    price = (100 - 0.10 * 100) * qty

print("Cost: "+str(price))

Explanation:

This prompts the user for the quantity

qty = int(input("Quantity: "))

This calculates the price or cost, without discount

price = 100 * qty

This checks if the quantity is greater than 1000

if qty >1000:

If yes, this calculates the price or cost, after discount

    price = (100 - 0.10 * 100) * qty

This prints the calculated cost

print("Cost: "+str(price))

Which is an email protocol that retrieves email without deleting the email and its attachments from the server?
Simple Mail Transfer Protocol (SMTP)

Internet Message Access Protocol (IMAP)

Post Office Protocol version 3 (POP 3)

Simple Network Management Protocol (SNMP)

Answers

Answer:

Internet Message Access Protocol (IMAP)

Explanation:

The "Internet Message Access Protocol" or IMAP was created by Mark Crispin at the Stanford Knowledge Systems Laboratory. It allows a person to access his email from his local server. In comparison to the Post Office Protocol Version 3 (POP 3), which deletes the emails once they are downloaded, the IMAP allows the contents to be saved on the server. The email will only be deleted if the user intends to do so.

Answer:

It is Pop 3 not IMAP

Explanation:

Correct on edg 2022

Allows input/output of audio info to and from the computer.

A. Central Processing Unit

B. Sound Card

C. Video Card

D. Audio Player

Answers

Answer:

sound card

.............

How important is the knowledge of ICT to a pupil like you?

Answers

For me it is not important

An application's certificate indicates the application -
A is regularly updated
B cannot be removed
C is installed
D is authentic

Answers

Answer:

D. is authentic

Explanation:

Authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification.

Biometrics, smart cards, digital certificates, and picture passwords are various methods that can be used to perform an authentication.

Hence, an application's certificate indicates the application is authentic. These certificates are generally referred to as digital certificates.

When an end user installs a software application or program, the computer or mobile device would automatically verify the digital signature contained in the software. If the authentication process is successful, the software would be installed. Else, the installation process would be terminated.

For which of the following situations would it be best to use a heuristic in order to find a solution that runs in a reasonable amount of time?
A Appending a value to a list of n elements, which requires no list elements be examined.
B Finding the fastest route that visits every location among n locations, which requires n! possible routes be examined.
c Performing a binary search for a score in a sorted list of n scores, which requires that fewer than n scores be examined.
D
Performing a linear search for a name in an unsorted database of n people, which requires that up to n entries be examined.

Answers

Answer:

The answer is "Option B".

Explanation:

In this question, determining the optimal path between several locations, which requires n!. It's also examining possible routes. It could just suggest here, designers need to do those equations as we have several forms. They have several methods to find the best and efficient path. Its basic idea is to use heuristic approaches for complex or uncertain issues so we do not provide proven solutions for linear programs.

The situation that should be best to use a heuristic in order to find a solution that runs in a reasonable amount of time is option B.

The following information should be considered:

For measuring the optimal path that lies between several locations that needs n!.It also examine the possible routes. It consist of various methods for determining the efficient path.

Learn more: brainly.com/question/17429689

Based on the following passage on construction technology during the Middle Ages, why might a worker not be allowed to join a guild?
During the Middle Ages, a family worked in a trade for generations, with fathers training sons and passing knowledge along bloodlines.
Masons learned how to carve elaborate gargoyles; glaziers made intricate stained-glass windows. These skilled workers were organized into
guilds, and on a construction site, guild workers were highly esteemed while lower-level unskilled workers completed simple routine tasks.
All laborers were paid.

He did not pass the necessary exams to qualify for guild membership

He had signed a contract forgoing payment in exchange for on-the-job training.

He was not born into a family of skilled laborers

His specialty did not fall under masonry or glazing.

Answers

Answer:

He was not born into a family of skilled laborers

Explanation:

An eReader has a 956-pixel x 1290-pixel grayscale display with each pixel able to display 32 shades of gray. What is the KiB size of the display memory for the device

Answers

Answer:

752.71 kilobytes

Explanation:

Given ;

956-pixel x 1290-pixel

Shades of gray, = 32

Bit depth (n) = 2^n

32 = 2^5

Bit depth, n = 5 bits / pixel

The size of display memory :

Pixel dimension * n

(956 Pixel * 1290 pixel) * 5 bits /pixel

= 6166200 pixel * bits / pixel

= 6166200 bits

Converting bits to kilobytes :

1 bit = 1/8 bytes

1 byte = 1/1024 kilobytes

Hence,

1 bit = 1/(8 * 1024) kilobytes

1 bit = 1/8192 kilobytes

6166200 bits = (1/8192 * 6166200) kilobytes

= 752.7099609375 kilobytes

= 752.71 kilobytes

A bubble starts by comparing the first item in the list to all the remaining items, and swaps where the first item is ____ a later item.
greater than
less than
equal to

Answers

Answer:

greater than

i think

A bubble starts by comparing the first item in the list to all the remaining items, and swaps where the first item is greater than a later item. Thus, option A is correct.

What happens in a binary sort?

Such a binary sort, in which we keep comparing the pairs of items, swapping them if they are not in order, until the smallest item bubble to the top of the list, therefore creating a sorted list which is known as bubble sort.

A Binary search tree (BST) is a type of data structure used in computer science that consists of nodes arranged in a hierarchical structure. Each node in a BST contains a value, and the left child node contains a value that is smaller than its parent, while the right child node contains a value that is larger than its parent.

This makes BSTs ordered, as the elements are arranged in a specific order. They are also sometimes called sorted binary trees, as the values are sorted in a specific order. BSTs are commonly used in computer algorithms, as they allow for efficient searching, insertion, and deletion of elements.

Thus, option A is correct.

Learn more about algorithms on:

https://brainly.com/question/22984934

#SPJ3

Megan wants to post a picture of her and her friend Jennifer on her social media page. What should Megan do before she posts the picture?

A. Add a caption.
B. Ask her friend for permission.
C. Make sure she looks good.
D. Edit the picture using Photoshop.

Answers

Answer:

B. Ask her friend for permission.

Explanation:

Answer: B ask her friend for permission

hope you do good on the test or quiz.. it would mean alot to be brainlEst

Other Questions
Which expression is NOT equivalent to2^357A 22257B 2^335C 2357D 857 The application of scientific knowledge to the development and improvement of goods and services is generally referred to as ______. Multiple choice question. technology information production how is hamlet a victim of cirumstance What is the decimal Expansion of the following fraction? What is the biome located to the south of the tundra Called? Use examples from the lessons to compose a well-developed paragraph on thefollowing:Why do historians consider the greatest achievement of the Byzantine Empire to bethe preservation of Greek and Roman cultures? (10 points) A mixture is made by combining 1.61 lb of salt and 5.37 lb of water. What is the percentage of salt (by mass) in this mixture? Simplify the expression and combine lime terms. 2(x + 6) + 3x + 4 ReNew Corporation raises funds to build renewable energy systems by issuing 3-year bonds with a coupon rate of 5% and a face value of $1,800. Assume that the market interest rate for a 3-year bond issued by a firm like ReNew is currently the same as the coupon rate. The price of each of these bonds is , which means that the bonds sell at . need help asap please !! Scenario: Multiplying PolynomialsInstructions:View the video found on page 1 of this Journal activity.Using the information provided in the video, answer the questions below.Show your work for all calculations.The Students' ConjecturesEmily and Zach have two different polynomials to multiply:Polynomial product A:(4x2 4x)(x2 4) Polynomial product B:(x2 + x 2)(4x2 8x)They are trying to determine if the products of the two polynomials are the same. But they disagree about how to solve this problem.1. Complete the table to summarize each student's conjecture about how to solve the problem. (2 points: 1 point for each row of the chart)Classmate ConjectureEmily Zach Evaluating the ConjecturesWho do you think is correct? (1 point)Analyzing the DataTable Method:2. Use the table to find the products of the two polynomials. Write your answer in descending order. (4 points: 2 points for each product)A) (4x2 4x)(x2 4) 4x2 4xx2 4 B) (x2 + x 2)(4x2 8x)there's another part on my profile, can u do it to please!! 37 people showed up to the party. There were 9 less men than women present. How many women were there? f) Two numbers are in the ratio 5:4. If they differ by 12, what are the numbers?g) The multiplicative inys What is 50 x 79 x 27 + 69 I'm writing this for English is there anything I should add/change?Dickens describes France with disdain when he writes that they ... rolled with exceeding smoothness down hill, making paper money and spending it. (Dickens 7). While the commoners starve the aristocracy live an extravagant and luxurious lifestyle. Dickens shows us the aristocracy is ruining Frances economy by saying they ... rolled with exceeding smoothness down hill This example tells us that France is quickly and effortlessly getting worse. The connotation of this example can be compared to a saying when something goes downhill, this means it becomes worse or less successful, which perfectly describes Frances economy. Saying France is making paper money and then immediately spending it shows that they are not worried about the commoners, they continue to live their lavish lifestyle even at the cost of people's lives. Can someone help me with my questions, it's for an assignment that's past due and I need to do itQ1. What Is another name for The excretory system? Q2. And why is that another name for The excretory system? Safety standards require a pool to add 3 chlorine tablets to every 2,000 gallons of water. Today, the lifeguards at Park Pool added 8 chlorine tablets to their pool's 10,000 gallons of water.How does Park Pool's chlorine compare to the safety standards?Choose 1 answer:APark Pool has more chlorine than the safety standards require.BPark Pool has less chlorine than the safety standards require.CPark Pool has the right amount of chlorine. Write an equation in slope-intercept form for the line that passes through the given point and is parallel to the following equation. Point: (5,4) Equation: y = 2/5x - 2 PARTIE B: Traduisez les phrases en franais. 1. We are having fun at school.2. I am brushing my hair.3. You (informal) undress in the bedroom.4. You (formal) do your hair.5. My name is __________________.6. She is resting on the sofa.7. He is mistaken.8. We are sitting down.9. I wake up at six oclock.10. He is shaving in the bathroom.11. You (formal) go to bed at ten oclock.12. You (informal) brush your teeth at seven oclock.13. I am getting ready very early.14. She is putting on makeup.15. We remember.16. I am bored.17. His name is________________.18. Her name is ___________________.19. I am arguing with my mother.20. I am located at school.Please use your own phrases and not use a translator. True or false a system of checks and balances ensures our judicial and legislative branches are always in agreement with our executive branch