1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katen-ka-za [31]
3 years ago
13

Daily IT Question

Computers and Technology
2 answers:
lilavasa [31]3 years ago
6 0

Answer:

D

Explanation:

You would not have to make a whole new set of punch cards if you knew the card that had the mistake. Simply remove this card from the pile and make a new punch card in its place.

lara31 [8.8K]3 years ago
5 0

Answer:

D

Explanation:

Businesses would not want to lose a lot of money due to one flaw, so they would find a simple way to fix it.

You might be interested in
I WILL GIVE BRAINLIEST TO WHO ANSWERS FIRST AND CORRECTLY.
svlad2 [7]

Answer:

The answer is false

Explanation:

Please give me brainliest so I can post my artwork

6 0
4 years ago
Consider the following recursive method. public static string recur(int val) { string dig = "" + (val % 3); if (val / 3 > 0)
Oksana_A [137]

The recursive method recur executes itself from within

When the statement System.out.println(recur(32)); is executed, the string value "2101" is printed

<h3>How to determine the output of the statement?</h3>

The flow of the program is as follows:

  • The method keeps updating the string variable dig with the remainder of the val variable divided by 3
  • When the remainder is less than or equal to 0, the method is exited

So, when 32 is divided by 3.

The remainders are 2, 1, 0 and 1

So, the output of the statement is "2101"

Read about java methods at:

brainly.com/question/19271625

5 0
2 years ago
A(n) ________ is the portion of virus code that is unique to a particular computer virus. A) virus signature B) encryptio
tino4ka555 [31]

Answer:

A) virus signature

Explanation:

Antivirus databases contain what are called signatures, a virus signature is a continuous sequence of bytes that is common for a certain malware sample.

--

Encryption is a way of scrambling data so that only authorized parties can understand the information.

7 0
2 years ago
In Java code, the line that begins with/* and ends with*/ is known as?​​​​​​​​​​​​​​​​​​​
Rainbow [258]

Answer:

It is known as comment.

6 0
4 years ago
What type of device is characteristic of an enterprise environment?
Nitella [24]
A workstation used at an engineering firm.
8 0
4 years ago
Other questions:
  • Which of the following can indicate what careers will be enjoyable ?
    5·1 answer
  • How would a designer interpret the word denier?
    12·2 answers
  • One item you will NOT need to provide when opening up a bank account
    9·2 answers
  • Use the Internet to gather information on four filesystems compatible with Linux. For each filesystem, list the situations for w
    12·1 answer
  • Develop a program that implements the POLYNOMIAL ADT using the LIST ADT. The POLYNOMIAL ADT is used to represent polynomials and
    8·1 answer
  • __________ intelligence is an approach to boundary spanning which results from using sophisticated software to search through in
    15·1 answer
  • What is the purpose of a Macro in Word?: *
    13·1 answer
  • Which kind of testing runs the system in a simulated environment using simulated data?a) validation testing. b) verification tes
    5·1 answer
  • Computer father known as​
    5·1 answer
  • What does the digital living network alliance standardize
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!