Someone help its about LA Doña 2
so basically I just wanted to know who has seen it all and where i can watch it
Answer:
If you look on Just watch it will show you the different people that currently have it right now it is sadly not on Netflix from what I could find out but it will probably be added later on.
Explanation:
Netflix sometimes takes its time adding shows which is sad but that is just how they work. I would recommend maybe trying it on a website that Just watch list or just buy the disc from eBay. either way, I wish you luck!
Justify the use of an e-diary in the organisation of the meeting.
Answer:
It can be used to easily organize stuff
Explanation: It can be easily used to organize meetings & write important stuff, and you will also never run out of pages, which is better than having no diary.
Pls Hurry!!!
What is the missing line of code?
>>> answer = "happy birthday"
>>> _____
'Happy birthday'
upper(answer)
capitalize(answer)
answer.capitalize()
answer.upper()
Answer:
It is answer.capitalize()
Explanation:
The missing line of code is:
>>> answer = "happy birthday"
>>> answer. Capitalize()
'Happy birthday'. The correct option is (C).
What do you mean by the line of code?Source lines of code (SLOC), also referred to as lines of code (LOC), is a software metric that counts the lines in the source code of a computer programme to determine the size of the programme.
Use cloc filename> to obtain the lines of code contained in a single file. To obtain the code lines in a straightforward Vue file, we are utilizing the command.
Furthermore, it acknowledged that it is a VueJS component. Using the cloc —by-file command, we may examine every line of code included in a file or directory.
Therefore, the missing line of code is:
>>> answer = "happy birthday"
>>> answer. Capitalize()
'Happy birthday'.
To know more about the line of code, visit:
https://brainly.com/question/18844544
#SPJ2
HOW CAN A PERSON GET BENEFITTED BY THE ICT BASEDSERVICES PROVIDED BY GOVERNMENT
Answer:
Explanation:
It aims to transform the entire ecosystem of public services through the use of information technology.ICT holds particular promise in areas of governance and public participation. Age can use information to reduce corruption and increase government transparency, accountability, efficiency and so finally gud night guys and take care.
plz mark as brainliest
You have to match the letter nexts to the numbers
Answer:
Word is for business letter 4+a
2+c Monthly budget expenses
3+b is for presentation
1+d department store inventory
Who you think is better? Ninja or TFue ,btw do you know who icebear is?
Answer:
no, no i dont think i will.
Explanation:
The ______ is designed to store audio data on computers and/or digital music players.
A. waveform
B. audio file format
C. sample rate
D. bandwidth
Answer:
audio file formats of computer
If you're driving a car and know there's a motorcyclist around you, you should______. A. Not change your driving B. Check your blind spots frequently C. Remind them to wear a helmet D. Make wider turns than normal
b check your blind spots frequently i guess not sure
Which is better, in most situations, a bumper switch or a limit switch, and why?
Answer:
limit switch because why not
Explanation:
Select the correct answer from the drop-down menu.
Chrissie shirks the additional work given to her.
She lacks the trait of
Answer:
Responsibility
Explanation:
Jon wants to set up a trihomed DMZ. Which is the best method to do so? A. use dual firewalls B. use a single firewall with only two interfaces C. use a single three-legged firewall with three interfaces D. use dual firewalls with three interfaces
Answer:
The correct option is C) Use a single three-legged firewall with three interfaces
Explanation:
DMZ is an acronym for a demilitarized zone.
A DMZ network is one is situated between the internal network and the Internet. It is supported by an Internet Security and Acceleration (ISA) server.
The interfaces you'd get with the DMZ network are
A public network (Internet Protocol-IP) address with a public interfaceAn internal network interface with a private network (IP) address A DMZ interface with a public network (IP) addressUnlike the back-to-back DMZ settings, a trihomed DMZ is unable to use private IP addresses. To use the trihomed DMZ, public IP addresses are a must suitable requirement.
Cheers!
The Quick Access tool bar allows you to customize the actions or commands you frequently use.
True
False
I need help pleaseeee
Answer:
The Answer is C. Hope you get it right, Good Luck!!!
Answer:
The answer is B
Explanation:
To create a list, paragraph, or unordered list, you should use HTML code, whereas in CSS coding, you can change the overall font size of a tag using the font-size=(number) tag.
Which component in a CPU is responsible for transferring
data from one functional component to another?
Why might be one reason a stock becomes more valuable over time?
A. The industry is growing
B. The company is well managed
C. There’s a lot of demand on the product
D. All of the above
CSS is a language that controls the way content on a web site appears. It uses_______ _____to
change the look of a page.
Answer:
I'm not sure what the answers are, but when someone is making a website from scratch, they tend to use CSS HTML and JS(javascript)
hope i helped ;)
how to take a pic with a cumputer
Answer:
Ctrl+Shift+4
Explanation:
Answer:
Use Snip+Sketch on your taskbar
It looks like this~
Seneca has just applied conditional formatting and realizes that she has made a mistake. Which action should she take to fix the mistake?
A) Clear the rule she created by going to the Conditional Formatting Rules Manager dialog box and deleting the rule.
B) Clear all rules that have been applied to the worksheet or selected range by clicking the Clear Rules button.
C) Use the Undo button or Ctrl+Z.
D) Right-click the area where the conditional formatting rule has been applied, and select Clear Rule from the menu list.
Answer:
its b
Explanation:
on edg
Answer:
b
Explanation:
what format can be applied to text in excel?
You can apply accounting format,date,numbers, currency, percentage or even fraction
. Write a Python command to assign the value 80.35 to a variable called 'point'.
Answer:
point=80.35
Explanation:
Which of the following expressions shows the correct amount of sales tax for the computer at Store A? Select all that apply.
6%($1,200)
0.6($1,200)
0.06($1,200)
One-sixth($1,200)
StartFraction 3 over 50 EndFraction($1,200)
Answer:
6%($1,200) 0.06($1,200) 3/50($1,200)
Explanation:
hope this helps sorry if i am wrong
have a nice day
Answer:
a,c,e
Explanation:
it just makes sense U^U
Describe how each command is used by matching the command to its purpose.
removes data fror
places it on the cli
Paste
cancels a previou
Undo
restores a previou
Copy
duplicates data a
clipboard
Cut
Redo
places data in its
Answer:
The correct answer to this question is given below in the explanation section.
Explanation:
The correct command matches its use are given below:
Paste Places data in its
Undo Cancel a previous
Copy Duplicates data on the clipboard
Cut Removes data for places it on the clipboard
Redo restores a previous
Paste term is used when you are placing copied data. Undo is used to cancel a previous action performed while Redo is used to restores a previously performed action. The copy is used to duplicate data on the clipboard while Cut is used to removes data for places/ to paste somewhere else.
Select all the lines that have a slope of 5/2
Answer:
Add a picture, then ask the question again.
Please help.
Why I'm I getting a syntax error.
In python, the word list is a keyword. It's not meant to be used for a variable. Try changing list to lst. There also might be other parts wrong with your code. If we could take a look at your whole function, we could determine if there is anything else wrong with your code.
Any application that wants to be displayed on the web must use the HTTP protocol
True
False
Answer:
true
Explanation:
¿En cuales situaciones concretas se puede aplicar las técnicas de conteo(particularmente las permutuaciones y las combinaciones) dentro de la informática?
Answer:
In which specific situations can counting techniques (particularly permutuations and combinations) be applied within computer science? for anybody trying to help
Which term means an unsecure protocol used when remotely accessing a computer?
Transmission Control Protocol (TCP)
Secure Shell (SSH)
Telnet
Internet Protocol (IP)
Answer:
9Internet Protocol (IP)
Answer:
The answer is Secure Shell (SSH)
A collection of computers, printers, routers, switches, and other devices
that can communicate with each other over some transmission medium
O network
O host part
subnet part
subnet
ermano envia foto de lo que necesitas yo te ayudo
where can you apply the hand wire splicing technique
Answer:
When you want to extend an electrical wire for an apparatus, e.g., a lamp or a speaker.
What are the characteristics of calendar sharing options in Outlook 2016? Check all that apply.
Answer:
a,b,c,e
Explanation:
Answer:
Quit your bickering in the replies on the other answer, this is correct.
Explanation: