1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
algol [13]
2 years ago
14

[80 points] Fill in the missing word.

Computers and Technology
1 answer:
AVprozaik [17]2 years ago
8 0

Answer:

except

you can use github copilot for this  question

You might be interested in
Password procedures, information encryption software, and firewalls are examples of measures taken to address:
Gnoma [55]
<span>Password procedures, information encryption software, and firewalls are examples of measures taken to address are all measures taken to safeguard information security and protect users data from being tampered or manipulated by invaders. 

In web, if we leave our information without encryption or if we leave our system without firewall, different types of security threats might arise: such as, information being hacked, manipulated or sent to wrong places. To avoid this information encryption is done. We might also need to firewall our system so that we can avoid unwanted access and invading of our privacy using malwares and other tools. </span>
5 0
3 years ago
Named constants should be used when they serve to improve readability and understanding. T or F
prisoha [69]
The answer is true.

Let's say we are calculating the volume of a grain silo where the the width is a constant, but the height can be changed.

In our code we would calculate the volume using something like:

PI * (WIDTH / 2)^2 * height

The variables in all caps would be named constants. Using them makes the code more readable to other people than if we were to just use their values like:

3.14 * (145.75 / 2)^2 * height




8 0
3 years ago
Read 2 more answers
What will cloud cumputing offer
seropon [69]
Cloud computing allows computers from all around the world that are not being used to be able to do extra computations. This removes many of the limitations of a single computer and lets the user calculate things much faster.
6 0
4 years ago
Why are security measures protecting gdp data so strict?
Semenov [28]
The stock market would behave very differently if people had easy access to that data.
7 0
3 years ago
How to do c++ programming
Kipish [7]

Answer:

Explanation:

learn by picking up courses and books

but if you don't have any prior programming experience, i recommend you DON'T do c++ first, but instead use an easier language to get the hang of it, like Python.

8 0
3 years ago
Other questions:
  • The checksum doesn't compute for a packet sent at the Internet Protocol (IP) level. What will happen to the data?
    14·1 answer
  • What does subscribing to a website’s RSS feed provide to a subscriber?
    10·1 answer
  • 3. The invention of the transistor was important to the development of computers because it
    5·1 answer
  • sharon gives a thumbs-up to her little brother who has just scored in his schools basketball game. sharon is communicating by us
    5·2 answers
  • A. Write a program that asks the user to enter an integer, then prints a list of all positive integers that divide that number e
    11·1 answer
  • What is the information that there are 24 hours in a day and 365 days in a year considered?
    6·2 answers
  • True or false: The objective of an Enterprise Resource Planning (ERP) system is to create a customized software program that int
    10·1 answer
  • Who is the first British in Europe ​
    10·1 answer
  • 1. Create an optimized function "print s(n,s)" that prints the given argument s (representing a string) k times. k represents th
    7·1 answer
  • Who is katie and why is she deleting my answers
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!