1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
garri49 [273]
3 years ago
5

Assume the number variable contains the number 1000.

Computers and Technology
1 answer:
Inga [223]3 years ago
5 0

Answer:

Explanation:

We could get the four options for this particular example, but we must know what happens with the variable number the value 1000.

In this case, we are going to assume four scenarios:

1) n = n - n this is equal to 0

2) n = (n - n) + n = 1000

3) n = n * 2 = 2000

4) n = n * 3 = 3000

These are simple examples, we could get these options in different ways.

You might be interested in
What are possible consequences for cyberbullying?
BaLLatris [955]

Answer:

Possible consequences for cyber bullying include depression, isolation and illness

Explanation:

The reason for this is when a person is hurt there body tends to go through things to make them feel a certain way about things.

3 0
3 years ago
Read 2 more answers
Wat is a computer risk<br>​
klemol [59]

Answer:

Virus, cyber theft

Explanation:

A computer risk is something that can potentially harm your data on your computer or harm you through a computer by using theft tactics from real people to autonomous viruses making it to your computer and slowing your computer. With cybrrtheft thieves can get personal info through accounts to pictures and payment information.

4 0
3 years ago
Read 2 more answers
When you break an iPad, can you recover an iMovie?
kompoz [17]
Yes, on your cloud. you should have an email 

7 0
3 years ago
Read 2 more answers
What should you do with a wireless-capable laptop if you connect a lan cable to it?
marusya05 [52]
A local-area network (LAN<span>)  cable is used in LAN networks to connect several computers or other networking devices.</span>
If you connect a LAN cable to a wireless-capable laptop you should turn the wireless capability off to maximize security, because through the LAN cable viruses can be transmitted, than can harm your computer.

6 0
3 years ago
Read 2 more answers
Discuss how file and process ownership can pose a threat to the security of a computer system.
Irina-Kira [14]
It can gain access to potentially bad information about you. I hope you enjoyed
8 0
3 years ago
Other questions:
  • You have a large company, and it is important to your business that your employees' work is backed up regularly. Which network w
    5·1 answer
  • What is a digital certificate? Select one: a. It is a means of establishing the validity of an offer from a person, entity, web
    7·1 answer
  • How do Europe and North America address the challenges of jurisdiction when a computer crime involves both continents?
    10·1 answer
  • According to the video, what are some hazards Stationary Engineers may face? Check all that apply. noise, hazardous materials, d
    7·2 answers
  • People are not interested in what you do _____. I think, more and more, they're not even really interested necessarily in how yo
    8·1 answer
  • A user has called the company help desk to inform them that their Wi-Fi enabled mobile device has been stolen. A support ticket
    13·1 answer
  • -How long does a copyright last?
    6·1 answer
  • Assume user_name equals "Tom" and user_age equals 22. What is printed on the console when the following statement is executed? c
    14·1 answer
  • What is one of the benefits of using a library in a program?
    5·1 answer
  • Identify the correctly constructed ALTER TABLE statement to add a UNIQUE constraint to the column customer_number with the const
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!