1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
n200080 [17]
3 years ago
14

You can obtain a disabled parking placard from your county

Computers and Technology
1 answer:
viktelen [127]3 years ago
5 0
 True, most US counties have made it mandatory to give out disabled parking placards for people who need it. 
You might be interested in
Concerning Structured Cabling, select the statement that is true, or select, "All statements are false."
ikadub [295]

Answer:

1) TRUE

2) FALSE

3) FALSE

4) TRUE

5) TRUE

Explanation:

1) vertical cross connects connect work stations to the closest data closet  TRUE

2) a patch cable is relatively short, from 20 feet to 90 feet

FALSE

3) the dmarc is located at the local telecommunications carrier's office

FALSE

4) the MDF(main distribution frame) is the centralized point of interconnection for an organization's LAN.

TRUE

5 )the IDF (intermediate distribution frame) is a junction point between the MDF and the entrance facility.

TRUE

7 0
3 years ago
The presentation layer describes the layer where computers interact with _____
Dovator [93]
I believe its other computers 
5 0
3 years ago
Read 2 more answers
Do you think that distributed OSs use a process-communication technique different from that used by desktop OSs?
Lady_Fox [76]

Answer: Yes

Explanation: A distributed operating system use a technique to comunicate across all the nodes that were connected to it while the communication maded by a desktop operating system is directly with the system itself, we can use a distributed operating system to get connected through various desktop operating system.

3 0
3 years ago
Write a program that reads a list of integers, and outputs those integers in reverse. The input begins with an integer indicatin
kkurt [141]

Answer:

The program to this question as follows:

Program:

#include <stdio.h> //header file.

int main() //main method.

{

const int size= 20; //define variable.

int a[size]; //define array

int i, n; //define variable

printf("Enter number of elements :"); //message.

scanf("%d", &n);//input size of array.

printf("Enter array elements :"); //message

for (i = 0; i < n; ++i) //loop

{

scanf("%d",&a[i]); //input array elements by user.

}

printf("Reverse order :\n");

for (i = 0; i < n; ++i) //loop

{

printf("%d ",a[n-i-1]); //print elements in reverse order.

}

return 0;

}

Output:

Enter number of elements :5

Enter array elements :5

4

3

2

1

Reverse order :

1 2 3 4 5  

Explanation:

The description of the above program as follows:

  • In the program firstly we include the header file and define a method that is "main method" in the method we define variables that are "size, n, i, and a[]".  The size variable is used to make a variable constant that means its value will not change in the program. We pass the size variable value to the array and use i variable for loop.
  • We use variable n and a[] for user inputs. In n variable, we input a number of elements to be inserted into an array and a[] we insert all array elements to insert these elements we use for loop.
  • Then we define another for loop in this loop we print all array elements in reverse order.
3 0
3 years ago
Information systems security is the collection of activities that protect the information system and the data stored in it.
ivann1987 [24]

Answer:

The answer is A. True.

Explanation:

Information systems security,refers to all the methods involved with assuring information integrity as well as keeping it confidential, and available.

It can also be defined as -

The detection and provisoon of solutions to security breaches.

Access controls, which prevents unauthorized system access.

Protection of information either in transit or in a storage area.

3 0
3 years ago
Other questions:
  • What's the fastest way to reset Android pin?​
    5·1 answer
  • Which of the following refers to a feature of wikis that allows the restoring of earlier work in the event of a posting error, i
    9·1 answer
  • Discuss anomaly detection.
    5·1 answer
  • Text messaging is an example of nonverbal communication. Please select the best answer from the choices provided. T F
    7·2 answers
  • Design and implement an algorithm that gets a list of k integar values N1, N2,...Nk as well as a special value SUM. Your algorit
    10·1 answer
  • Ann needs to share information about a new hiring policy. She needs to communicate this information to more than one hundred emp
    15·2 answers
  • Identify traits of entrepreneurs. Check all of the boxes that apply.
    11·1 answer
  • Is there anyone that knows how to work in Microsoft Access and someone that could help me on my test at 11 30am?​
    7·1 answer
  • How do I get the bot token for discord? (scripting etc)
    5·1 answer
  • What legal protection would cover a person invention?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!