1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
e-lub [12.9K]
2 years ago
12

Rather than entering an IP address into our browser, we use a text-based address known as a(n

Computers and Technology
1 answer:
zalisa [80]2 years ago
7 0

Answer:

url

Explanation:

You might be interested in
An online game is played with two dice, explain why decomposition will be used in creating the algorithm for the game?
wolverine [178]
Decomposition will be used so you can break down the game into smaller and more manageable parts.
5 0
3 years ago
Read 2 more answers
What term is used to identify the visual interface that displays information it receives from the computer?
olga nikolaevna [1]
The answer to this question is A
7 0
4 years ago
(3)(6 Points) During a sale at a store, a 10% discount is applied to purchases over $10.00. Write a program that asks for the am
Galina-37 [17]
I only need point sort
7 0
3 years ago
How many comparisons will be made to find 8 in this list using a linear search?
Kobotan [32]

Answer:

4

Explanation:

4

6 0
2 years ago
To print factorial of any<br>input number <br>QBASIC​
lukranit [14]

Answer:

The program in QBasic is as follows;

PRINT "Number: "

INPUT N

LET FACT = 1

FOR I = 1 TO N

     FACT = FACT * I

NEXT I

PRINT FACT

END

Explanation:

This prompts user for number

PRINT "Number: "

This accepts input from the user

INPUT N

This initializes the factorial to 1

LET FACT = 1

This iterates through the number the user inputs and calculates its factorial

<em>FOR I = 1 TO N </em>

<em>      FACT = FACT * I </em>

<em>NEXT I </em>

This prints the factorial

PRINT FACT

The program ends here

END

5 0
3 years ago
Other questions:
  • A(n) _____ is a type of man-in-the-middle attack where an attacker captures the data that is being transmitted, records it, and
    15·2 answers
  • Your computer has gradually slowed down. What's the most likely reason?
    8·1 answer
  • Consider the partially-filled array named a. What does the following loop do? (cin is a Scanner object)int[] a = {1, 3, 7, 0, 0,
    6·1 answer
  • using C++ to sort user input. for example, user enter 25numbers and sort them from small to big or big to small, cout thesamlles
    6·1 answer
  • The MAA is responsible on a daily basis to protect office computers and patient records and personal information from hackers. R
    12·1 answer
  • ____ is the process of drawing a series of increasingly detailed DFDs, until all functional primitives are identified.
    7·1 answer
  • Two of the major sources used today for obtaining information to create computer maps are satellites and _____________.
    11·2 answers
  • er reports that he is having problems with his monitor. He explains that his laptop's liquid crystal display (LCD) is no longer
    13·1 answer
  • A summer camp offers a morning session and an afternoon session. The list morningList contains the names of all children attendi
    6·1 answer
  • What is an example of a recent development in technology
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!