1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nimfa-mama [501]
2 years ago
13

I need help with my work

Computers and Technology
1 answer:
Naily [24]2 years ago
4 0

Answer:

totally

awesome

Explanation:

You can evaluate the expressions in the statements by hand:

if (a*b!=c) evaluates to

if (2*3 != 11)

if (6 != 11)

if (true)

so the next line is executed (it prints 'totally')

Likewise, the other if statement also evaluates to true.

You might be interested in
An effective problem statement ensures that
swat32
The software design effectively addresses the issues
6 0
3 years ago
To save a document with a new name, click _______ in the navigation bar and enter a new filename.
cricket20 [7]
Click the save as button
3 0
3 years ago
Sales management wants a small subset of users with different profiles and roles to be able to view all data for compliance purp
Lapatulllka [165]

Answer:

Last Option is correct answer. ( Option D)

Explanation:

Option A is rejected because this will allow the view permission but as mentioned the management want a new profile for the users as well.

Option B is rejected because again it will not facilitate the different profile requirement.

Option C is not answer because It will only help in viewing the data and granting permission.

Option D is selected because it will meet both requirements which are to make a new profile first of all and then grant the View permissions to these profiles for the user subset.

7 0
3 years ago
What is the title of RFC 4890 and what year was this RFC published?
Phantasy [73]

Answer:

The title of RFC 4890 is "Recommendations for Filtering ICMPv6 Messages in Firewalls" and it was published in 2007.

Explanation:

RFC 4890 is the memo that was published in 2007. This document is about the recommendations of filtering messages that are harmful and having security risk for Internet Control Message Protocol ICMP version 6.

In this document different types of risk associated ICMPv6 protocol while forwarding messages. This memo recommends filtering techniques to drop the harmful messages and make the communication secure.

4 0
3 years ago
Describe at least three things you could do to prepare for giving an effective and engaging business presentation. (1-3 sentence
puteri [66]
To prepare for giving an effective and engaging business presentation;
1. Know your subject and be able to answer questions.
2. Practice your presentation until you are confident in your delivery
3. Get plenty of sleep the night before and have a light breakfast the day of.
4 0
3 years ago
Read 2 more answers
Other questions:
  • What does a linear bus topology used to connect all network devices?
    8·1 answer
  • Two or more computers that are linked together are called which of the following
    7·1 answer
  • The rule of thumb that predicts that the number of transistors on a cpu will double every two years is called ________ law.
    7·1 answer
  • Translate I don't sing into Spanish​
    11·2 answers
  • Why is it important to be part of a team in times you fail and in times you succeed?​
    15·1 answer
  • During the _____ of the systems development life cycle (SDLC), an information system is operating, enhancements and modification
    9·1 answer
  • Next, go to the mw_tour.html file. Within the document head, create links to the mw_layout.css and mw_styles.css style sheet fil
    10·1 answer
  • A ddr4 dimm with a pc rating of pc4-17000 is running at what speed?
    15·1 answer
  • One last question
    7·2 answers
  • python. create a program that asks the user to input their first name and their favorite number. Then the program should output
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!