1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Firlakuza [10]
1 year ago
8

Which concept allows the computer to repeat a group of steps in an

Computers and Technology
1 answer:
allochka39001 [22]1 year ago
7 0

Answer:

A

Explanation:

I was gonna say 'loop' from my computing days. but it is now called iteration

You might be interested in
FREE POINTS FIRST TO ANSWER GETS BRANLIEST!!! :)
kicyunya [14]

Answer:

THX

Explanation:

4 0
3 years ago
Read 2 more answers
Is a practice that helps to prevent the download of viruses and other malicious code when checking your email?
Natalka [10]

Do not access links or hyperlinked media such as buttons and graphics in email messages.

<h3>What is a best practice that can prevent viruses and other malicious code?</h3>
  • View email in plain text and don't view email in Preview Pane.
  • Using antivirus software is the best way to defend your computer against malicious code.
  • If you think your computer is infected, run your antivirus software program. Ideally, your antivirus program will identify any malicious code on your computer and quarantine them so they no longer affect your system

To learn more about malicious code, refer

to brainly.com/question/9143118

#SPJ4

7 0
1 year ago
Explain agile testing ​
melomori [17]

Answer:

Explanation:

Agile testing is software testing that follows the best practices of Agile development. For example, Agile development takes an incremental approach to design. Similarly, Agile testing includes an incremental approach to testing. In this type of software testing, features are tested as they are developed.

5 0
3 years ago
A network on the internet has a subnet mask of 255.255.240.0. what is the maximum number of hosts it can handle
Lera25 [3.4K]
It is a class B network, so for a class B network, the upper 16 bits form the network address and the lower 16 bits are subnet and host fields. Of the lower 16 bits, most significant 4 bits are 1111. This leaves 12 bits for the host number. So, 4096(2^12) host address exists. First and last address are special so the maximum number of address is 4096-2=4094.
7 0
3 years ago
Write the functions of utility!​
maw [93]

Answer:

Utility software is software designed to help to analyze, configure, optimize or maintain a computer. It is used to support the computer infrastructure - in contrast to application software, which is aimed at directly performing tasks that benefit ordinary users.

5 0
3 years ago
Other questions:
  • "HotelExp” is a 3-D range name applied to the workbook shown.
    12·1 answer
  • A(n) ____________________ defines the number and type of daemons that are loaded into memory and executed by the kernel on a par
    12·1 answer
  • Is the movie IT really that scary ? Rate between 1-10, 10 being I had nightmares
    6·1 answer
  • After the following code is executed what will be displayed on the screen? bool correntEmployee = true; double empSalary = 45000
    7·1 answer
  • To create a cover letter to send to potenial employers alone with a resume what software program should you use
    11·1 answer
  • 4. An abstract data type is defined as _____.
    14·1 answer
  • What is the function of a breadcrumb trail website
    7·1 answer
  • You are setting up your Windows computer to connect to the Internet and notice that when you type www.microsoft, the browser doe
    15·1 answer
  • What are Important points to include about preventing the download of malware?
    14·1 answer
  • 20.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!