1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tema [17]
1 year ago
11

When does if(x!=y) execute?

Computers and Technology
1 answer:
Dmitriy789 [7]1 year ago
4 0

Answer:

A

Explanation:

You might be interested in
What is software piracy?
Semmy [17]

Answer:

B

Explanation:

stealing someone else's private data

5 0
2 years ago
Which statement best describes a scientific theory?
lisov135 [29]

Answer:

It is supported by many different experiments.

Explanation:

Scientific theory is based on different experiments and tested in different situations and environment will all aspects. If the experiment finds true then observations will become theory. It can be changed in future if it does not meet the newly proposed conditions. But It does not means that, every theory can be changed.

6 0
3 years ago
Write a MIPS assembly language program that
8_murik_8 [283]

Answer:

123456789098765432

Explanation:

asdfghjklokjhgfdsasertyujn nbgfdfvbnjujhgvfcdec vgfredfghjmk

5 0
3 years ago
What is inputted into a computer system?
Anna [14]

Answer:

Hey mate.....

Explanation:

This is ur answer.....

<em>Input refers to any information, or data, that is sent to a computer for processing. Input is often sent to the computer from a device such as a keyboard, mouse, or other input device. Putting it simple, input is the act of entering data into a computer.</em>

<em />

Hope it helps!

Mark me brainliest....

FOLLOW ME!!!! :)

4 0
2 years ago
What are the reason of making computer virus.​
GenaCL600 [577]

Answer:

Some computer experts create computer viruses to prove certain a process will work

Explanation:

6 0
2 years ago
Read 2 more answers
Other questions:
  • Which three phrases describe a wireframe
    12·1 answer
  • The set of instructions that directs the computer to perform a variety of tasks is known as a
    9·1 answer
  • True / False
    5·1 answer
  • Field names should NOT start with a(n) -<br> hyphen (-)<br> Oa<br> asterisk (*)<br> space()
    8·1 answer
  • Jeremy Aronoff has purchased a new laptop. He wants to customize the operating system to meet his
    7·1 answer
  • Write the definition of a class employee base on the modular specification: . A data member for Id of type int (private). A data
    10·1 answer
  • What keyboard functions lets you delete words
    15·2 answers
  • The type of medium used to hide data in steganography is referred to as __________. This may be a photo, video, sound file, or V
    12·2 answers
  • There are some games that cannot be described by a single--or even two-- genres. Can you think of any that should be invented?​
    6·1 answer
  • The most common technique for using an appropriate synchronization mechanism to serialize the accesses to prevent errors is to a
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!