1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ElenaW [278]
2 years ago
10

Q3: What do you mean by a pointer to a pointer? Can this be extended?

Computers and Technology
1 answer:
konstantin123 [22]2 years ago
7 0

Answer:

hola, te habla mi contestadora si no te contesto seguro no quiero hablar con vos

donde vas si son las 11?

todo el barrio la conoce

Explanation:

le gusta sentirse mala, tiene un tubo en la Sala

para tumbar el club

kiere quedarse dentro del party

será cuestión de tiempo?

conosco tu debilidad

You might be interested in
a term to describe article that can be displayed in their entirety as opposed to abstract and reference only?​
Maurinko [17]

Answer:

would it be term and tequnique?

Explanation:

oooooooo

7 0
3 years ago
What are the pros and cons of using ICT
qaws [65]

Answer:

Pros:

- Connect with friends, family in a short period of connecting time

- Faster, easier than paper

- The messages can be stored in the device for longer times, without being damaged, unlike paper files that easily get damages

- Digital communication can be done over large distances through internet and other things.

And many other pros

Cons:

- Software can be easily hacked

- Digital Communication has completelymake people become far to others. They would stop meeting face-to-face but instead of that, video call, chatting is become more popular

- Most of devices have hidden recording mechanisms that can take your information unknowingly and may be used to attack you in the future

And many other cons

Hope this helped :3

5 0
4 years ago
Your boss in the human resources department asks you to write a function that calculates the length of time that employees have
Tems11 [23]

Answer:

Option D is correct i.e., =DATEDIF(C2, $AE$2, "y").

Explanation:

The user's supervisor well into the following department tells him to compose the feature which measures the amount that times staff has served in their company utilizing the DATEDIF feature. Consider whether C2 includes the hiring dates for that staff and then that cell $AE$2 includes the cut-off point for whom to evaluate the hiring time with the duration of the service.

So, therefore the following option is correct according to the given scenario.

4 0
3 years ago
Part of preforming routine computer maintenance includes
omeli [17]
Cleaning And tidy cords
7 0
3 years ago
Read 2 more answers
John is analyzing strange behavior on computers in his network. He believes there is malware on the machines. The symptoms inclu
enot [183]

Answer:

Boot Sector Virus

Explanation:

A malicious software or malware is an executable line of code, programmed by a cybercriminal for ill intentions. There are many types of malware namely; viruses, rootkit, keylogger, trojan horse etc.

A boot sector virus is a kind of malware that runs before the operating system, affecting the boot sector of the hard disk, so even when a linux live cd is running as the operating system, the virus is still active.

5 0
3 years ago
Other questions:
  • 1. Describe an application where a series circuit might work better than a parallel circuit
    11·2 answers
  • Computer hardware had been designed to run a single operating system and a single app, leaving computers vastly underutilized. o
    15·1 answer
  • Mobile devices typically come pre installed with standard apps like web browsers , media players, and mapping programs true or f
    9·1 answer
  • You can tell that the equals() method takes a ____ argument because parentheses are used in the method call.
    6·1 answer
  • Throughout the course we have covered a lot of topics in relation to information systems. Select one or two of the major topics
    14·1 answer
  • Why is it uncommon for users to perform searches directly in database tables?
    15·1 answer
  • Was just testing how this works, no actual question; feel free to take the points anyways though. ​
    13·1 answer
  • Explain how you can apply the computer in your field of study​
    6·1 answer
  • Which of the following statements is TRUE of a peer-to-peer network?
    10·1 answer
  • Consider the following statement: String myMiddleInitial = “h”;
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!