What level does Drantini evolve? I'm currently grinding on my TI 84 calculator.

Answers

Answer 1

Answer:

Dratini first evolves into dragonair at level 30, which then later on evolves into dragonite at level 55.


Related Questions

1. An auto repair shop charges as follows. Inspecting the vehicle costs $75. If no work needs to be done,
there is no further charge. Otherwise, the charge is $75 per hour for labour plus the cost of parts, with a
minimum charge of S120. If any work is done, there is no charge for inspecting the vehicle. Write a program
to read values for hours worked and cost of parts (cither of which could be 0) and print the charge for the job. ​

Answers

Answer:

charge = 0

hours_worked = int(input("Enter the hours worked: "))

cost_of_parts = float(input("Enter the cost of parts: "))

if hours_worked == 0:

   charge = 75

else:

   charge = 120 + (75 * hours_worked) + cost_of_parts

   

print("The charge is $" + str(charge))

Explanation:

*The code is in Python.

Initialize the charge as 0

Ask the user to enter the hours_worked and cost_of_parts

Check the hours_worked. If it is 0, that means there is no inspecting. Set the charge to 75

Otherwise, (That means there is an inspecting) set the charge to 120, minimum charge, + (hours_worked * 75) + cost_of_parts

Print the charge

40 points!!! Which of the following is a disadvantage of outsourcing?

A) The contracting company may not be able to preform the task.

B) Outsourcing does not allow business to focus on important tasks.

C) Outsourcing has higher costs.

D) It is harder to communicate with an outside company

Answers

Answer:

C.

Explanation:

All the other options are obtainable.

That which can be considered as a disadvantage of outsourcing is;  D) It is harder to communicate with an outside company

What is Outsourcing?

Outsourcing refers to the act of assigning work to contracted employees. This is a very good measure that can be used to help the business save costs and focus on more important tasks.

The money that would have been used in maintaining the staff is used to pay the outsourced company for an agreed period of time.

Usually, the contracted company is specialized in the aspect of the business for which they receive the contract.

The option that qualifies as a disadvantage of outsourcing is that it is harder to communicate with outside companies.

Linguistics with foreign organizations might not be as smooth as with employees.

Learn more about outsourcing here:

https://brainly.com/question/4456416

The presentation programs' basic commands are found in ____.

Answers

Answer:

taskplane

Explanation:

A(n) ___________________ is a broad term that applies to a wide range of systems used to manage information security.

Answers

Answer:

Information Security Management System -

for jhoantm please don't answer

Answers

I had to answer lol, I’m curious who Jhoantm is?

Answer:

its been a month, i dont think hes going to answer

Explanation:

The telephone, invented in 1876, converted acoustic sound to electric signals. However, the audio production industry began using the electrical recording system only in 1925. Why was there a delay in using this technology in audio production? The missing piece of technology that prevented the audio production industry from using the electrical recording system earlier was a device that could the electric signal. The device that made this possible was the .

Answers

Answer:

The missing piece of technology that prevented the audio production industry from using the electrical recording system earlier was a device that could amplify the electric signal. The device that made this possible was the Audion valve

Explanation:

The telephone system in the passage is able to convert sound to electronic signals in a crude manner, without amplification. The electrical recording system, whereby a microphone converted sound into amplified electrical signals  was, made possible by the invention of the electronic valve, known as the Audion triode vacuum tube by Lee De Forest in 1906. Electrical sound systems were built based on the Audion tube before transistor-based audio equipment became commercially available in the 1950s.

Commands under menu bar in a computer

Answers

Answer:

File, Edit, and View

Explanation:

These are the standard ones that come with the software.

Which of the following could be a method for an object-oriented class called Student?
Group of answer choices

1.startCar

2.pages

3.teacher

4.printGrades

Answers

A method for an object-oriented class called Student could be: 4. printGrades.

What is a class?

In object-oriented programming (OOP) language, a class can be defined as a user-defined blueprint (prototype) or template that is typically used by programmers (software developers) to create objects and define the data types, categories, and methods that should be associated with these objects.

Additionally, an object class In object-oriented programming (OOP) language represents the superclass of every other classes when a programming language such as Java is used.

In conclusion, printGrades could be a method for an object-oriented class called Student.

Read more on object-oriented class here: brainly.com/question/20264183

A storeowner rents movies to customers. How can a database help the store owner?

Answers

The database can help the store owner as it will help them to monitor  the movies, customers, orders, and movie suppliers for their single movie rental store.

What is database?

A database is known to be a kind of organized composition of structured information, or data, that are said to be stored electronically in a computer system.

Conclusively, An example are MySQL, SQL Server, MongoDB, etc. These modern databases are managed by DBMS.

Learn more about database from

https://brainly.com/question/518894

how the changes to the engines of the aircraft have made it more aerodynamic

Answers

Explanation:

Winglets are devices mounted at the tip of the wings. Winglets are used to improve the aerodynamic efficiency of a wing by the flow around the wingtip to create additional thrust. They can improve airplane performance as much as 10% to 15%.

A feature that allows you to quickly apply the contents of one cell to another cell or range of cells selected.

O auto fill

O auto sum

O fill down

O fill right

Answers

Answer:

Auto fill

Explanation:

I took the test!

What tool should you use to extend network services beyond the demarc.

Answers

Punchdown tool is the tool should you use to extend network services beyond the demarc.

What is a punchdown tool?

The punch down tools are known to be set of tools that one can use to stop wires into punch down patch panels and bring down keystone jacks.

Note that a tool head blade is often employed  to push a wire conductor into a IDC terminal slot and as such this Punchdown tool can help you to extend network services beyond the demarc.

Learn more about network services  from

https://brainly.com/question/3521925

The TechWorld goes on a fast pace, what do you think would be the solution to the growing amount of data being collected by the software applications to have a fully sustainable usage for customers like us?

Answers

The solution to the growing amount of data in software applications to have fully sustainable usage for customers is;

Development of a sustainable model for the future now requires data storage that is engineered to be lower power requirements, lower cooling requirements, and lower waste production.

Sustainable data storage and usage

The objective of Sustainable Data Storage Initiative is to spread awareness of the solutions that can reduce the environmental impact of high waste producing data centers.

The environmental impact of data infrastructure is growing as data workloads increase. Hence, building a sustainable model for the future now requires data storage that is engineered to be lower power requirements, lower cooling requirements, and lower waste production.

Read more on Sustainable data storage and usage;

https://brainly.com/question/24882256

Write a program that asks the student for his name and the month in which he/she was born. Students are then divided into sections, according to the following: Section A: Name starts between A - E Born between months 1 - 6 Section B: Name starts between F - L Born between months 1 - 6 Section C: Name starts between M - Q Born between months 7 - 12 Section D: Name starts between R - Z Born between months 7 - 12 Section E: All others

Answers

The program is an illustration of loops and conditional statements

What is a loop?

A loop is a program statement that is used to perform repetitive operations

What is a conditional statement?

A conditional statement is a statement that is used to make decisions

The main program

The program written in Python, where comments are used to explain each line is as follows:

#This creates an empty list for the sections

A = []; B = []; C = []; D = []; E = []

#This gets input for the number of students

count = int(input("Number of students: "))

#This iterates count times

for i in range(count):

   #This gets the name of each student

   name = input("Name: ").upper()

   #This gets the birth month

   month = int(input("Month: "))

   #The following if conditions determine the section of the student

   if name[0] in ['A','B','C','D','E'] and (month >= 1 and month <=6):

       A.append(name)

   elif name[0] in ['F','G','H','I','J','K','L'] and (month >= 1 and month <=6):

       B.append(name)

   elif name[0] in ['M','N','O','P','Q'] and (month >= 7 and month <=12):

       C.append(name)

   elif name[0] in ['R','S','T','U','V','W','X','Y','Z'] and (month >= 7 and month <=12):

       D.append(name)

   else:

       E.append(name)

#This prints the students in each section

print(A,B,C,D,E)

Read more about loops and conditional statements at:

https://brainly.com/question/24833629

Question: 7 What is a Distributed Denial of Service (DDoS) attack?

A: An attempt by a government to deny Internet access to its citizens

B: An attempt to deny access to a website by flooding the website's servers with millions of requests from different computers

C: An attempt by one user to deny service to another user by posting malicious material on a social network

D: An attempt by an Internet user to access private information stored in a private database Nuesti

answer B ​

Answers

Answer:

B

Explanation:

your answer B is correct because it is Distributed meaning it is not just from one user or one government, but a network of computers flooding a server and denying the service offered by the server

John is given a laptop for official use and is on a business trip. When he arrives at his hotel, he turns on his laptop and finds a wireless access point with the name of the hotel, which he connects to for sending official communications. He may become a victim of which wireless threat? Group of answer choices Evil twin Evil networking Evil attacker Evil access control

Answers

Answer:

evil attacker or evil control

Is this statement true or false?

Electric currents flow easily through materials that are conductors and through materials that are insulators.

True
False

Answers

True cuz think of it like this a conductor of a train is traviling the conductor(electricity) is traviling through the insulators

>>> password = "sdf345"
>>> password.isalpha()
>>>

Answers

Answer:

False

Explanation:

just took this on edge. have a good one!

Answer:

The answer is False because the first number isn't capitalized.

Explanation:

Have a great day today, and be safe

An exception thrown from outside a try block:_________. a. will cause the program to terminate execution b. will be caught outside the catch block c. will be caught inside the catch block d. will remain inside the throw block None of these

Answers

Answer: A, It will cause the program to terminate execution.

Explanation: If an exception is thrown **inside** of a try block then it will be caught inside of the catch block but in this instance it’s asking what happens if the exception is thrown on the **outside** the try block so because the error cannot be caught in the catch block it leads to the program terminating.

The ____ header starts with hexadecimal 49 49 2A and has an offset of four bytes of 5C 01 00 00 20 65 58 74 65 6E 64 65 64 20 03.

Answers

The correct word for the blank space about the given header that starts with the given hexadecimal and the given offset bytes is; XIF header

What is the computer header?

The correct answer is the XIF Header also called the EXIF (Excahangeable Image File format header).

EXIF file format is the same thing as JPEG file format. The EXIF inserts some of image information data and thumbnail image to JPEG in order to achieve conformity to the JPEG specification.

Finally, this XIF header starts with hexadecimal 49 49 2A and has an offset of four bytes.

Read more about headers at; https://brainly.com/question/12435434

what is the full form of icimod?

Answers

Answer:

International Centre for Integrated Mountain Development

Explanation:

you're welcome

True or False: Data in a smart card can be erased

Answers

Answer:

I think its true but i can't explain it

Answer:

False

Explanation:

optical memory cards can store up to 4MB of data.but once the data is written it cant be changed or erased

Which student is demonstrating the most effective time-management skills?

Answers

could you please elaborate? i’m not sure what you’re trying to ask!

Answer:

Carlo sticks to a regular study schedule.

Explanation:

I did this already.

Avoid useing suggestive

Answers

The Internet is much more anonymous than the real world. People can hide their identities or even pretend to be someone they're not. This can sometimes present a real danger to children and teens who are online. Online predators may try to lure kids and teens into sexual conversations or even face-to-face meetings. Predators will sometimes send obscene material or request that kids send pictures of themselves. Therefore, it's important to teach your kids to be on their guard whenever they're online.

Teens are generally more at risk from predators. Because they are curious and want to be accepted, they may talk to a predator willingly, even if they know it's dangerous. Sometimes teens may believe they are in love with someone online, making them more likely to agree to a face-to-face meeting.

Hope it helps :)!~ (Sorry if you get it wrong or if I got it wrong-)

~The Confuzzeled homan

Leslie’s parents put a big dry-erase board on the refrigerator and let the kids write suggestions for how to organize and assign household chores. Which step of problem solving does this situation illustrate?

A. Define the problem
B. Evaluate the solution
C. Determine possible solutions
D. State and check assumptions

Answers

Answer

determine possible solutions

Explanation:

im assuming

ty for the thanks

Which of the following least illustrates inequity caused by the digital divide?

Answers

The head of government is in the prime Minister

What will be the output of the following code?int p = 3,ch = 2;switch(ch){case 1: System. Out. Println("The square is: " + p*p);break;case 2: System. Out. Println("The cube is: " + p*p*p);break;default: System. Out. Println("No Output Value");}

Answers

“The cube is: 27”
or p^3
The switch function uses the ch int and identifies a matching case. Because ch is 2
We use case 2
Thus the following line at the top is printed.
Then automatically breaks the function, so we don’t continue.

_____ is typically used to temporarily hold small units of program instructions and data immediately before, during, and after execution by the central processing unit (CPU).
a) The motherboard
b) The control unit
c) Main memory

Answers

Answer:

A register

Explanation:

Registers are small memory used to store data or values and supply them to the processor as and when needed. These register hold the data temporarily and hold small units of program instructions. So whenever the CPU wants to work on data they have to be made available through the registers. Even after a arithmetic operation the registers serve as buckets for holding the value.

There are different types of registers such as register A, B, C etc and these registers lie in close proximity to the CPU so that we could provide the data immediately and much faster when asked by the CPU.

Therefore we can say that registers are used to temporarily hold small units of program instructions and data immediately before, during, and after execution by the central processing unit (CPU).

When a client PC is booted, it broadcasts a __________________________ message over the network to locate DHCP servers on the same subnet.

Answers

When a client PC is booted, it broadcasts a Dhcpdiscover message over the network to locate DHCP servers on the same subnet.

What is a Dhcpdiscover message?

The Dhcpdiscover message is known too be a message that has a kind of an identifier that is specific  to a client (such as the MAC address).

This message is one that also has some other requests, such as:

Requested options e.g  subnet mask, domain name server, etc.

Note that if client PC is booted, it shares a Dhcpdiscover message over the network to locate DHCP servers on the same subnet.

Learn more about network from

https://brainly.com/question/1167985

does anyone know how to by pass this pls help?

Answers

Answer:

Yeah all you Gotta do is press download file

Explanation:

mark me brainliest!!

Other Questions
WILL MARK BEST ANSWER BRAINLIEST: Give an example of a hook for comparing apples and oranges and are usually always the same gender,Identical twins have identical DNA,A. temperamentB. blood typeC. personalityD. experiencesTHE answer is B A dark outline of a house with one pure black tone is an example of chiaroscuro. A. True B. FalsePLEASE HELP!!! Which equation for g(x) represents the transformation of f(x) given that f(x) = x^2g(x) = f(x) shifted left 2 units?PLEASE HELPPP Damien deposited $250 in an account that earned 3.75% interest compounded annually.He did not make additional deposits or withdrawals.What will be the balance in this account at the end of 4 years? Over the years, the Securities and Exchange Commission (SEC) has delegated its statutory authority to establish accounting principles for publicly traded companies in the United States. This delegated authority impacts which organization(s) Which of the following is the greatest common factor of 60 and 64? Which statement best summarizes a theme that is found in both passages? people can find the divine by studying the natural world. People should not question the presence of the divine. The differences between animals prove the divine is not real. The powers of the divine are frightening to behold In which phase does a cell grow the most? What happens when there is a change in the DNA of a gene This trapezoid represents the base of a right prism that has a surface area of 1280 square feet. The sum of the lengths of the legs of the trapezoid is 52 feet. What is the height of the prism? Enter your answer in the box.PLEASE HELP I WILL GIV BRAINLY. 50 POINTS. Preventive measure of Marasmus? HELP! Should be easy for people who have taken the class. renee used the values in the table to calculate simple interest 00.50.55%50% PLEASEEW HELPPP WILL MARK BRAINLEST !!pntssTriangle ABC with vertices A(1,4), B(4,1), and C( 1,1) is graphed on the coordinate plane below.Which transformation of (triangle)ABC would yield ( triangle)A'B'C' so that AC is parallel to B'C'?Which transformation of AABC would yield AA'B'C' so that AC is parallel to B'C'?1.) a 180 clockwise rotation about the origin2.) a 90 counterclockwise rotation about the origin3.) a reflection across the y-axis4.) a reflection across the x- axis His father, judging from his many handicaps, is very smart and talented, but he seems miserable. Do intelligence and talent carry responsibilities with them? Pls help me on this problem Im confused Please give me the answers what are some examples of verbal irony in invisible man? i need help with this please!