1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
diamong [38]
3 years ago
14

How do you mark somebody the brainliest?

Computers and Technology
2 answers:
Katena32 [7]3 years ago
6 0

when 2 people answer your question, the brainliest button will appear in the spot of the thanks button

Hope This Helps!      Have A Nice Day!!

statuscvo [17]3 years ago
3 0

✯Hello✯☆(❁‿❁)☆

↪  There has to be 2 answers

↪  You can have to have any rank above beginner

↪  When 2 answers there will be a thing next to the thanks button saying 'mark as brainliest'

↪  Press that

:)

★ВУёヽ(‘∀`○)ノВУё☆

❤Gianna❤

You might be interested in
Keith has to carry out a photo shoot to capture images of the ocean during the monsoons. What is a recommended practice when sho
Semmy [17]

Answer:

Answer is A: place absorbent chemical packets in the camera cover

Explanation:

Keith is required to carry adequate gear while going for a shoot. And in this case, he should carry anything that will protect his camera from the ocean and rainwater. By anything, I mean anything that Keith will use to stay dry. Using an air conditioner would be the worst idea. An air conditioner might blow the air towards your camera. Placing the camera in its case will ensure that it is dry and Keith will keep on shooting. Placing absorbent chemical packets in the camera cover will ensure that any water droplets that might fall on the cover of the camera will be absorbed. The point here is to keep dry.

6 0
3 years ago
To protect the computer network of a large organization, network engineers monitor network traffic. This traffic is compared to
ioda

Answer:

To protect the computer network of a large organization, network engineers monitor network traffic. Malware detection method of data mining best being used to protect the network.

Explanation:

Data mining has excellent potential as a malware detection tool. It allows us to analyze vast sets of information and gives an opportunity to extract new data from it. It also provides the ability to identify both known and zero-day attacks.

5 0
3 years ago
Read 2 more answers
Indicates how fast the engine is moving in rpms.
lapo4ka [179]
That would be called a <span>tachometer </span>
7 0
3 years ago
Write a function that receives two numbers, m and n and calculates and displays the sum of the integers from m to n. For example
Evgesh-ka [11]

Answer:

The program to this question as follows:

Program:

//header file

#include <stdio.h> //defining header file

void inc(int m,int n) //defining method inc

{

   int sum, i; //declaring variable

   sum=m; //holding value of m variable

   for(i=++m;i<=n;i++) //loop for calculate number between given range  

   {

   sum=sum+i; //adding value

   }

   printf("sum of the integer is : %d",sum);//print value

}

int main() //defining method

{

   int m,n; //defining integer variable

   printf("Enter m value: "); //message

   scanf("%d",&m); //input value by user in variable

   printf("Enter n value: "); //message

   scanf("%d",&n);//input value by user in variable

   inc(m,n); //calling method

   return 0;

}

Output:

Enter m value: 3

Enter n value: 7

sum of the integer is :25

Explanation:

In the above code, an "inc" function is declared, that accepts integer parameters that are "m and n", inside the method two integer variable "sum and i" is declared, which is used in the loop.

  • The loop uses the user parameter to count value and uses the sum variable to calculate there sum.
  • In the main method, two integer variable n and m are declared, which take value from the user end, and at the last, we call the inc method, that prints sum value.
7 0
2 years ago
Give at least five (5) practices that you must observe in your classroom.​
atroni [7]

Answer:

Offer second chances/clean slates.

Be resourceful.

Make learning active.

Be an advocate.

Pursue lifelong learning.

8 0
3 years ago
Read 2 more answers
Other questions:
  • which type of classroom enable students to attend lectures without being physically present with the teacher
    14·2 answers
  • Piers wants to take a course on XML. He is a certified web designer, but he has not used XML before. How can he use XML to impro
    6·1 answer
  • Henry, a graphic artist, wants to create posters. Which software should Henry use for this purpose?
    13·1 answer
  • Beth would like to run an nmap scan against all of the systems on her organization's private network. These include systems in t
    15·1 answer
  • A(n) ____ investigation tracks all elements of an attack, including how the attack began, what intermediate devices were used du
    5·1 answer
  • Silas develops this algorithm to compute the calories burned for an activity for a given number of minutes and body weight: If t
    6·1 answer
  • WHICH PROGRAMMING LANGUAGES ARE THE BEST FOR PROGRAMMING?
    14·1 answer
  • Im coding and need help please answer or comment to help. any skilled coders comment below
    12·1 answer
  • SOMEONE HELP ME!!!!!
    8·1 answer
  • In _________, the process requests permission to access and modify variables shared with others. a) entry section b) critical se
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!