1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jekas [21]
3 years ago
11

Wich command converts a number to a string​

Computers and Technology
1 answer:
AfilCa [17]3 years ago
8 0

Answer:

okay yes i agree

Explanation:

You might be interested in
Which of the followings is design tool?[2 marks]
aalyn [17]

Answer:

Data Flow Diagram

Explanation:

Data flow diagram is representation of data which is processed in terms of input and output.It is a tool for designing the structure for a software.Rectangles,square and circles are used in representing the flow of information.

DFD consists two components

  • Layers-It consist many layers,the top layer is called context diagram.
  • Levels-The first level shows the main process of the system.
6 0
3 years ago
Which best describes the possible careers based on
Kisachek [45]

Answer:

It's c bodie I'm fr on this question rn lol

6 0
3 years ago
Read 2 more answers
While working in a group of two the members are not getting along. You bring the two members together so they can discuss this i
Sergio [31]

Answer:

D)

Explanation:

At first the two members just want to create the presentation but work together and agree to share the research and work together on creating the presentation.

The conflict resolution is more than agree upon problem, identify issue or brainstorm solutions. The answer is D) negotiate a solution.

3 0
2 years ago
My mac book airs touch pad stopped working and i can't click. what do i do?
julsineya [31]
Get it in to be fixed
7 0
3 years ago
Read 2 more answers
You receive a suspicious text message from an unknown sender asking you to click on a link to access your current credit score.
Lyrx [107]

Answer: Phishing

Explanation: A cybercrime in which, a target or targets are contacted by email, telephone or text message by someone acting or posing as a legitimate institution to lure these targets or a target into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords is referred to as Phishing.

The CyberCriminals use these information to access important accounts, steal identities and even money.

Beside email and website phishing, there are phishing methods like 'vishing' (voice phishing), 'smishing' (SMS Phishing).

SOME FEATURES OF PHISHING EMAILS

The Emails are usually Too Good To Be True with a sense of Urgency, telling you to click on the link fast because the offers are limited.

They may tell you that your account will be suspended unless you update your personal details immediately and with attachments you are supposed to click on and from an unusual sender.

Whether it looks like it's from someone you know or don't know if anything seems out of the ordinary, unexpected, out of character or just suspicious please don't click on it the link. It might just be phishing.

7 0
3 years ago
Other questions:
  • We may think of relationships in the E/R model as having keys, just as entity sets do. Let R be a relationship among the entity
    14·1 answer
  • If someone were unable to pay cash right now, which financing option would be best for the laptop and for the refrigerator?
    10·2 answers
  • The force of impact is____.
    8·2 answers
  • What is the drawback of the linear model?
    5·2 answers
  • Briefly describe the interface between the memory and the processing unit. That is, describe the method by which the memory and
    6·1 answer
  • What would happen if computers only had input peripherals and a CPU
    11·2 answers
  • To adjust the margins on a page, users will navigate to the _____ tab.
    13·2 answers
  • Fuction table of JK-Flip flop?
    11·1 answer
  • The __________ operator increases the value of the variable by 1 after the original value is used in the expression in which the
    7·1 answer
  • You are about to repair and change the resistor (small components),but the components are too small to solder and hold,what tool
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!