What is wrong with the code below?
print(ICT is the best)

Answers

Answer 1

Not sure what language this is, but most languages would require the string to be printed to be in quotes, typically double quotes.

print("ICT is pretty good")


Related Questions

A LAN is usually confined in a single building.
True
False

Answers

Answer:

true

Hope it helps.you

virtual classrooms are examples of communication or not​

Answers

Answer:

I would say yes

Explanation:

Answer:

Yes it is an example of communication

Explanation:

Communication is as simple as talking.

What is cpu????????????????????????????

Answers

Answer:

CPU

Explanation:

CENTRAL

PROCESSING

UNIT

Answer:

computer processing unit

it is the main device to control and give signals to the device

what does this mean, i am so confused- Explain the importance of identifying the purpose/use for pre-production documents

brainiest to be given

Answers

Answer: These are mostly used in interior design, fashion design, and advertising. they are often used to generate ideas for a client to meet their approval before making the final product. It can help in terms of planning because it could be used to create a design or a theme.

Explanation: yw

What size hard disc would you recommend if I want to buy a computer for practising PowerPoint presentations at home and why do you recommend such a size

Answers

Answer:

PowerPoint is computer program which uses graphics with an in-build templates that could be used or customized, for creating slides for presentations. It has so many versions which for example include PowerPoint 2013, PowerPoint 2016. It doesn't require so much hard disc space, unlike some programming software and gaming applications. For Power point 2013 version, it can run on a computer with a 1 GHz processor (speed of the computer), operating system of windows 7 and above, a 3 GB disk space and a 2GB RAM of internal space. While if a 2016 power point version is to be used, a processor speed of 1 GHz will do, a minimum of 1 GB ram equivalent to 32-bit, hard disk space of 3 GB, then a minimum of windows 8. All these parameters mentioned above are important to ensure a smooth running of the computer program. As a lesser processor might result to the slow running of the computer program.

Explanation:

Hard disc is storage device in a computer, It has bigger data capacity than floppy disks. It exists in different storage capacity measured in kilobytes, gigabytes and terabytes.

Why now days 3D images are used in cartoons? What are the drawbacks of 2D image?

Answers

Answer:

There are no drawbacks

Explanation:

People just think 3D is more modern-ish. I liked 2D better, but whatever- things are changing.

Answer:

There are no drawbacks

Explanation:

explain the 2 types of network topology ​

Answers

Answer:

Mesh- The mesh topology has a unique network design in which each computer on the network connects to every other.

Tree- Tree topologies have a root node, and all other nodes are connected which forming a hierarchy.

pls mark as brainliest

Explanation:

Explain what alphanumeric data is.

Answers

Answer:

A-Z  and 0-256

Explanation:

The letters and numbers recognized by the computer. The computer does not recogniz 257

what is social media​

Answers

Answer: As the word connotes, it is a form of MEDIA for SOCIAL interaction. "Interaction and communication" are the core of Social Media.

Explanation: Social media is a broad term used to describe the various tools, networks and technologies for sharing content, ideas and knowledge and connecting and collaborating online. Contrary to the popular conception, social media is something much more than simply making friends online. These days, it's being extensively used for promoting brands.

my iphone will not charge at all. what do i do!!!!!!

Answers

Answer:

u need a battery replacement

Explanation:

that's y

Answer:

It might be the charger and you might need to get a new one. I'm not exactly sure. Hope you found out!!

Explanation:

Discuss the evolution of file system data processing and how it is helpful to understanding of the data access limitations that databases attempt to over come

Answers

Answer:

in times before the use of computers, technologist invented computers to function on disk operating systems, each computer was built to run a single, proprietary application, which had complete and exclusive control of the entire machine. the  introduction and use of computer systems that can simply run more than one application required a mechanism to ensure that applications did not write over each other's data. developers of Application addressed this problem by adopting a single standard for distinguishing disk sectors in use from those that were free by marking them accordingly.With the introduction of a file system, applications do not have any business with the physical storage medium

The evolution of the file system gave  a single level of indirection between applications and the disk the file systems originated out of the need for multiple applications to share the same storage medium. the evolution has lead to the ckean removal of data redundancy, Ease of maintenance of database,Reduced storage costs,increase in Data integrity and privacy.

Explanation:

Which tools can be used to scale an object? Check all that apply.
rotation handle
side sizing handles
Format Picture pane
corner sizing handles
Remove Background tool

Answers

Answer:

format picture pane

corner sizing handles

Explanation:

Answer:

C and D

Explanation:

Type the correct answer in the box. Spell all words correctly.
Natasha came across a website that had a building image, where each window in the building was clickable. She clicked on one of the windows,
Upon clicking the link information was sent to another computer. This computer processed the information and returned the appropriate page
about a window. Which attribute is used in this case to identify the type of image map?
The
attribute is used in this case to identify the type of image map.

Answers

Answer:

Redirection

Explanation:

This is something called redirection, you can sometimes get paid for it, or just some sort of reward, sometimes even a virus scanner.

Answer:

The  ismap  attribute is used in this case to identify the type of image map.

Explanation:

Using ismap indicates to your browser that the link is processed by another computer (server). Once the server processes the information about the link, it returns the appropriate page.

Can anybody tell me why when I use my camera to scan the question is not working?

Answers

Answer:

Have you tried reseting or updating your device?

Explanation:

Answer:

im not sure, I tried scanning a question, and when I do it scans only half the question.

Explanation:

what is MICR used for​

Answers

Answer:

MICR (magnetic ink character recognition) is a technology used to verify the legitimacy or originality of paper documents, especially checks. Special ink, which is sensitive to magnetic fields, is used in the printing of certain characters on the original documents.

Explanation:

Answer:

MICR (magnetic ink character recognition) is a technology used to verify the legitimacy or originality of paper documents, especially checks. Special ink, which is sensitive to magnetic fields, is used in the printing of certain characters on the original documents.

Explanation:

Semiconductors are only somewhat conductive electronic components.

True or False?

Answers

Answer:

True

Explanation:

A semi conductor can be defined as a material , a component or a substance that has the ability to conduct or transmit electricity partially.

This is because their ability to conduct electricity or to be conductive occurs between a conductor and an insulator.

Examples include silicon, carbon, germanium, e.t.c.

Semiconductors help to control and regulate the rate at which electricity is conducted or transmitted.

Therefore, semiconductors are only somewhat conductive electronic components.

Explain the term default field properties.

Answers

Answer:

programs or names included in the software by the programmer. It is always used unless changed.

Explanation:

Tech A says that most lug nuts and studs are right-hand threaded, which means they tighten when turned clockwise. Tech B says that some lug nuts and studs are left-handed, which means they tighten when turned counterclockwise.

Answers

This question is incomplete.

Complete Question

Tech A says that most lug nuts and studs are right-hand threaded, which means they tighten when turned clockwise. Tech B says that some lug nuts and studs are left-handed, which means they tighten when turned counterclockwise. Who is correct?

a) Tech A

b) Tech B

c) Both Tech A and B

d) Neither Tech A not B

Answer:

c) Both Tech A and B

Explanation:

The Wheels of cars or vehicles are attached or fastened to the car rims using what we call lug nuts and wheel studs. The lug nuts attached or torqued properly on the wheel studs in order to ensure that the wheels of the car are well secured , attached and firm.

We have different types of lug nuts and wheel studs. The differences is based on the threading that it found on both the lug nut and wheel studs.

We have:

a) The right handed threaded lug nuts and studs(wheel studs)

b) The left handed threaded lug nuts and studs(wheel studs).

The right handed threaded lug nuts and studs are tightened when they are turned in the clockwise direction while left handed threaded lug nuts and studs are tightened in the anticlockwise or counterclockwise direction.

It is important to note that no matter the kind of lug nuts and studs(whether right handed threaded or left handed threaded) used to fastened wheels to car rims, it is essential that they are well fastened and torqued to car to prevent them from loosening up.

For the question above, both Tech A and Tech B are correct. Therefore , Option C is the correct option.

A misplacement of punctuation or spacing in a command during programming that causes the program to stop running is most
likely which type of error?
syntax
run-time
logic
compiler

Answers

Answer:

Hello!

The answer is

A. Syntax

Explanation:

syntax errors are due to misuse of the proper syntax in the programming language.

(idk if my explanation helps, but it's Syntax.)

Hope this helps!

A misplacement of punctuation or spacing in a command during programming that causes the program to stop running is most likely a: A. syntax error.

What is a syntax error?

A syntax error can be defined as a type of error that typically occurs due to mistakes in the source code of a program such as:

Spelling of words.Punctuation errorsIncorrect labelsSpacing

In conclusion, a misplacement of punctuation or spacing in a command during programming that causes the source code of a program to stop running is most likely a syntax error.

Read more on computer codes here: brainly.com/question/25619349

#SPJ2

What can you do on Forms?
Create a Survey
Create a Quiz
Make a permission slip
All of the above

Answers

Answer:

I believe the answer is "all of the above"

Explanation:

What is a user data?

Answers

Answer:   Any data the user creates or owns.

Explanation:

the user being the one on the otherside of the computer, usually a human.

but examples of user data are intalled programs, uploads, word documents created by user (computer user)

state two reasons why you would upload and download information​

Answers

Answer:

get a better understanding of the problem

Explanation:

to be able to understand what it means and to be able to remember it in the future

Is a hard disk is considered to be an internal storage device?

Answers

Answer:

CPU

Explanation:

because it is a hard disk

Yes

A hard disk is an internal device that permanently stores data, but it is a secondary storage device. It is directly attached to the disk controller of a motherboard of a computer.

I hope this makes sense:)

Assume you need to create a presentation on the effects of global warming. Keeping the topic in mind, you need to
focus on certain key guidelines while creating the presentation. In a table, list those appropriate guidelines that you
would follow to create an effective presentation. Your table should have guidelines related to image choices, font
size for the heading and body text, background and text color for the slide, number of bullet points you will use,
and number of words per line. Also, provide your rationale about the choices for these elements.

Answers

Answer:

................................................................................................

Explanation:

Write code using the range function to add up the series 20, 30, 40, ... 90 and print the resulting sum each step along the way.
Example Output
20
50
90
140
200
270
350
440

Answers

Answer:I DK but if you expaln it I can help. Sorry.

Explanation:

How do you access the dark web? What are the negatives of doing this?

Answers

the dark web is illegal and therefore people can hack you, obtain your information (identity theft) etc.

Software licensed using the Open Software Initiative (OSI) definition
does not allow developers to include it in proprietary software.
never restricts software modifications in any way.
can be modified and re-licensed as proprietary software.
is always free of cost.
DONE

Answers

Answer:It's C "Can be modified and re licensed as proprietary software

Explanation

It's ok edj.

Answer:

its c

Explanation:

What G-Suite Apps integrate with Forms
Google Classroom
Google Sites
Google Sheets
All of the Above

Answers

Answer:

google sheets

Explanation:

why are medical related professions and human resources important? ​

Answers

Answer:

See below.

Explanation:

Medical related professions are identified as one of the core building blocks of a healthcare system. The role of "medical related professionals" in healthcare industry is confined to managing safety and legal issues, ensuring efficient performance, and developing problem solving and decision-making skills.

1...difference between repeater and hub .
2... difference between bridge and router .​

Answers

Answer:

Explanation:I don't say you have to mark my ans as brainliest but if you think it has really helped you plz don't forget to thank me..

1. A repeater amplifies and extends signals, while a hub is a multi-port device that broadcasts data to all connected devices, creating a shared collision domain.

2. A bridge connects network segments at the data link layer and forwards packets based on MAC addresses, while a router connects networks at the network layer and forwards packets based on IP addresses.

1. Difference between a Repeater and a Hub:

Repeater:

Operates at the physical layer (Layer 1) of the network.

Regenerates and amplifies network signals to extend their reach and overcome signal degradation.

Does not inspect or manage network traffic.

All devices connected to a repeater share the same collision domain.

Transparent to network protocols and does not interpret data.

Hub:

Operates at the physical layer (Layer 1) of the network.

Multi-port device that broadcasts incoming data to all connected devices.

Creates a single collision domain, causing devices to contend for network bandwidth.

Lacks intelligent traffic management and filtering capabilities.

Limited in terms of network performance and scalability due to shared bandwidth

2. Difference between a Bridge and a Router:

Bridge:

Operates at the data link layer (Layer 2) of the network.

Connects and joins separate network segments or LANs to form a single logical network.

Forwards data packets based on MAC addresses.

Builds and maintains a table (MAC table) of MAC addresses and associated network interfaces.

Bridges are commonly used to reduce network congestion and improve performance within smaller networks.

Does not perform IP address-based routing.

Router:

Operates at the network layer (Layer 3) of the network.

Connects multiple networks and routes data packets between them based on IP addresses.

Determines the best path for packet delivery using routing tables and protocols (e.g., RIP, OSPF, BGP).

Performs network address translation (NAT) and offers features like firewall and network traffic management.

Enables communication between networks with different IP address schemes.

To learn more on Bridge and Router click here:

https://brainly.com/question/13486343

#SPJ4

Other Questions
Pablo is 4 feet 10 inches tall. what is his height in inches? What were Mayan pyramids used primarily for Mathematics VIIJennifer Kent receives 24 paychecks each year. Each check is for $863.50 beforedeductions. What is Jennifer's weekly salary? B is the intersection of line AC and line ED. Find the measure of each of the angles.The measure of angle ABFThe measure of angle ABDThe measure of angle EBCThe measure of angle FBCThe measure of angle DBG please help me again one last time for this lol. Which statements describe functions of DNA? Select three options. What challenges do you think the nation would face as it began its recovery from war?Check any of the boxes that match your opinion. GIVING BRANLIEST!!!What was the Freedmens Bureau?A Confederate agency who sought to intimidate African-AmericansAn agency of African-Americans who fought in the Civil WarAn United States agency who sought to protect the legal rights of African-AmericansA group of slave owners who united in order to reclaim their slave property A car dealership sold 78 cars in April. The dealership wants to increase the number of cars sold by 30% inMay. How many cars will the dealership need to sell to reach their goal? What is one of the most important beliefs in Buddhism?A. Rituals are necessary to be reincarnated at higher levels.B. There is only one god, and all people must obey his will.C. Humans can escape suffering by living a certain type of life.D. Societies should be organized around secular principles. Summarize the path of the egg through the femalereproductive system. You are planning to use Spark to create a machine learning model that recommends restaurants to users based on user details and past ratings for restaurants What is the simplest way to implement this model? Use a Logistic Regression algorithm to train a classifier. Use a K-Means algorithm to create clusters. Use an alternating least squares (ALS) algorithm to create a collaborative filtering solution. Use a Decision Trees algorithm to train a regression model. Choose the single logarithmic expressionthat is equivalent to the one shownlog 2 + log 4 - log 7 6x + 7 = 67 1361012 7 inches and the height is 3 inches I need help!! ASAP please and thank you!! I cant solve this answer THE thousand injuries of Fortunato I had borne as I best could, but when he ventured upon insult I vowed revenge. You, who so well know the nature of my soul, will not suppose, however, that gave utterance to a threat. At length I would be avenged; this was a point definitely, settled --but the very definitiveness with which it was resolved precluded the idea of risk. I must not only punish, but punish with impunity. A wrong is unredressed when retribution overtakes its redresser. It is equally unredressed when the avenger fails to make himself felt as such to him who has done the wrong. It must be understood that neither by word nor deed had I given Fortunato cause to doubt my good will. I continued, as was my in to smile in his face, and he did not perceive that my smile now was at the thought of his immolation. As a narrator, Montresor can best be described as _____. Evaluate ab + c for a = 2, b = 3, and c= 4.010279 If someone stops taking a highly addictive drug abruptly andbegins to experience pain and depression, they are likely goingthrough: WITHDRAWALTOLERANCEOVERDOSEDEPENDENCE