1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sertanlavr [38]
3 years ago
11

Quick time and flash are two examples of what product

Computers and Technology
1 answer:
zheka24 [161]3 years ago
8 0

there apps .........

You might be interested in
What is technology and how does it work?
Yuki888 [10]
Technology is what we use today to access internet and social media!!!
8 0
3 years ago
Write code that read from variables N and M, multiply these two unsigned 32-bit variables and store the result in Variables P, Q
Tamiku [17]

Answer:

Using C language;

#include <stdio.h>

int main()

{

int N, M;

printf("Please enter two numbers: ");

scanf("%d %d", &N, &M);

int P,Q = N*M;

return 0;

}

Explanation:

The variables N and M are declared and the "scanf" function is used to assign a value to the variables from the input prompt, then the product of N and M are saved to the P and Q variables.

8 0
3 years ago
What is a characteristic of a wan hub-and-spoke topology?
olga nikolaevna [1]

The characteristic of the WAN hub and spoke topology is that it is considered to be a branch site or composed of the branch site in which they are likely to be connected to a site that is central and that is through the point to point links.

8 0
2 years ago
CO! Oher...9
kondor19780726 [428]

Answer:

Altitude of the town(h1) = 1,196.8 m

Explanation:

Given:

Height of barometer(h) = 65 cm Hg = 0.65

Standard atmospheric pressure  = 76 cm Hg = 0.76

Density of mercury(Pm) = 13,600 kg/m³

Density of  air (Pa) = 1.25 kg/m³

Find:

Altitude of the town(h1)

Computation:

Pressure due column = Δp mercury column

(Pa)(h1) = (Pm)(h)

(1.25)(h1) = (13,600)(0.76-0.65)

(1.25)(h1) = 1,496

Altitude of the town(h1) = 1,196.8 m

6 0
3 years ago
What methods do phishing and spoofing scammers use?
Misha Larkins [42]

Answer:

please give me brainlist and follow

Explanation:

There are various phishing techniques used by attackers:

Installing a Trojan via a malicious email attachment or ad which will allow the intruder to exploit loopholes and obtain sensitive information. Spoofing the sender address in an email to appear as a reputable source and request sensitive information

4 0
2 years ago
Other questions:
  • What item on a business card is generally the most prominent?
    13·2 answers
  • Question: A famous Disney Movie partially takes place in this city.
    15·2 answers
  • A content-managed site can be customized _____.
    12·1 answer
  • What type of program would use to create a personal budget?
    14·1 answer
  • 20 Points!! Please hurry!!
    9·1 answer
  • Which of the following identifies the patterns used for each data series in a chart?
    13·1 answer
  • Do you think boot-camp-style treatment centers can help young. People kick smartphones addictions?
    14·2 answers
  • Name three actions you should take if you believe you’ve been victimized by crimeware or online fraud
    11·2 answers
  • A database that is created and maintained using services such as Microsoft Azure or Amazon AWS is called a(n) _____ database.
    7·1 answer
  • Consider the following language:
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!