1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IRISSAK [1]
2 years ago
10

Why would a programmer use this code block?

Computers and Technology
1 answer:
olasank [31]2 years ago
5 0
C. To select a parameter for a games’s appearance when it starts.
You might be interested in
15. The text of a desktop publishing document is often created using
Feliz [49]
The answer is C. Word processing software
word processing software refers to the program that is functioned to compose, format, and editint text for printing documents.
In the recent years, the market for word processing software is dominated by Microsoft word and Apple pages.
3 0
3 years ago
Read 2 more answers
To type the letter address, _________ space from the dateline
miskamm [114]

Answer: Double

Explanation:

I just took the test

4 0
3 years ago
Read 2 more answers
Write an algorithm that receives a number from the user (you can store the number in a variable called N). Then the algorithm sh
lbvjy [14]

Answer:

Algorithm:

1. Declare an integer variable N.

2. Read the value N from user.

3.While(N):

 3.1 find r=N%10;

 3.2 print r in new line.

 3.3 Update N as N=N/10.

4.end program.

Implementation in C++.

// header

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

// variable

int N;

cout<<"Enter an Integer:";

   cin>>N;

// find the digits of number

   while(N)

   {

       // last digit

       int r=N%10;

       // print last digit

       cout<<r<<endl;

       // update the number

       N=N/10;

}

return 0;

}

Output:

Enter an Integer:329                                        

9                                                          

2                                                          

3

7 0
3 years ago
One way to protect against a security threat to a computer system is to __________. Avoid external links with inconsistent URLs
Makovka662 [10]

One way to protect against a security threat to a computer system is to Avoid external links with inconsistent URLs.

<h3>What is malware?</h3>

Malware is any programme that is purposely designed to disrupt a computer, server, client, or computer network, leak private information, obtain unauthorised access to information or systems, deny users access to information, or otherwise interfere with the user's computer security and privacy.

One way to protect against a security threat to a computer system is to Avoid external links with inconsistent URLs. The reason for this is that such links may contain malware or spyware.

Learn more about Malware:

brainly.com/question/14276107

#SPJ1

7 0
2 years ago
Describe FIVE significant advantages of web-based applications for an organisation.
masya89 [10]

Answer

There are a lot of advantages of web based applications.

Explanation:

Below are the advantages:

  1. Web based applications can be accessed from device that is connected to the device.
  2. No physical software required to download, install, update or manage which saves a lot of administration work for large companies.
  3. Web based software is compatible with any device or platform. The software is delivered through a browser of the users' choice.
  4. Mobile device applications allow for access to the software when out of the office.
  5. Direct access to latest information for Employees where every they are located.

Apart from these, there are lot more benefits, like quick and easy updates, centralized data where data is secure and easy to backup.  We can reach anybody, anywhere in the world.

Business costs are drastically reduced by spending less time talking to customers over the phone.

Online training can be finished at user's own time and risk.

It's available 24 hours a day, 7 days a week

The software is always up-to-date

8 0
3 years ago
Other questions:
  • How do you delete text from a slide
    14·2 answers
  • All of the following are qualities of an aprenticeship except
    12·1 answer
  • How do you calculate typing speed
    8·1 answer
  • The largest type of computer system with the most extensive storage capacity and the fastest processing speeds is a ________.
    7·1 answer
  • Suppose that a computer can read or write a memory word in 5 nsec. Also suppose that when an interrupt occurs, all 32 CPU regist
    10·2 answers
  • Write a Java program that generates GUI (Graphical User Interface). Your program should provide labels and textfields to a user
    9·1 answer
  • Write a class called Person that has two data members - the person's name and age. It should have an init method that takes two
    12·1 answer
  • What is the output for the following program?
    6·1 answer
  • After a Hacker has selects her target, performed reconnaissance on the potential target's network, and probed active Internet Ad
    13·1 answer
  • Question 7 (1 point)
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!