1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mart [117]
3 years ago
8

Answer all of the questions correctly and you will be amazing. Fill in Blanks

Computers and Technology
1 answer:
Naya [18.7K]3 years ago
5 0
A.Chicken Street
B.You just got Vectored
You might be interested in
Which are examples of hardware? Select 3 options.
umka21 [38]

Answer: OS(Operating System), CPU, And The Program That you use to view email

6 0
3 years ago
Read 2 more answers
The first step of converting data into a table is:
adell [148]
B. Select the range of data. You have to highlight it first so it knows what you are going to convert into a table.
8 0
3 years ago
Question B_1 (15 points) Please define (describe) local variables and how they are used in computer programming ( e.g. In C, C )
OverLord2011 [107]

Answer and Explanation:

Static variables are variables that still maintain their values outside the score which they are declared. They are declared with the static keyword

Example:

<em>static int score = 30;</em>

Local variables are variables whose scope are restricted to a block. Their values are restricted to the block which they are declared in.

Example:

<em>void abd(){</em>

<em>int score;</em>

<em>}</em>

<em>score is a local variable to abcd() function</em>

5 0
3 years ago
Which is an example of a crime that might occur in an e-commerce transaction?
Zolol [24]

Answer:

A costumers credit card information is stolen and used by someone else.

6 0
3 years ago
Read 2 more answers
What is the full form of BD in computer​
grin007 [14]

Answer:

the full form of BD binary digits

7 0
2 years ago
Read 2 more answers
Other questions:
  • Jason is an aspiring filmmaker. He manages finance and makes sure that everyone is involved in the project. Which role is Jason
    12·1 answer
  • The specific term for expediting the delivery of software by breaking a task into smaller increments is called
    12·1 answer
  • Using Turtle Graphics, write a program that will produce 2 Zs next to each other. It is irrelevant where these Zs appear and wha
    10·1 answer
  • What is the very first thing a user usually must do to gain access to a secure computer?
    7·1 answer
  • Problems and Exercises 16 through 43 are based on the entire ("big" version) Pine Valley Furniture Company database. Note: Depen
    13·1 answer
  • _____ is the widely used transport layer protocol that most Internet applications use with Internet Protocol (IP).
    9·1 answer
  • You are building a network and need to connect five computers in an office. They will be on the same network segment and you sho
    5·1 answer
  • Using C++
    15·1 answer
  • Users who are connecting to an NLB cluster have been complaining that after using the site for a few minutes they are prompted t
    15·1 answer
  • How many total cells can a worksheet window contain? If columns are labelled alphabetically, what will be the label for the cell
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!