1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zloy xaker [14]
4 years ago
8

PLZZZZZZZZ HURRY What is FireWire?

Computers and Technology
2 answers:
ycow [4]4 years ago
7 0

Answer:C

Explanation:

Ostrovityanka [42]4 years ago
6 0
I believe it’s C.. or 3
You might be interested in
What is the result of the following code fragment?
anastassius [24]

Answer:

D

Explanation:

I don't know the language, but it is clear what is going on.

It looks like you are defining a value for a in both commands.

a.multiply(b); looks like you take the value in a (which is 10) multiply it by 25 and put the result back in a. So so far we have 10 * 25 = 250

Note the next command

a.add(b)

looks like you take the current value in a(which is now 250)

and put the value of b (which has not been changed. It is still 25) and put that in a (which is 250).

The result is 250 + 25 = 275

The answer is D. Since I only understand the logic, if this answer is wrong, I wish you'd leave a note.

4 0
3 years ago
All information that is to be processed by a computer must first be entered into memory via an input device.
Goshia [24]
The answer is true, since it needs to be sent to the main server to be processed
3 0
2 years ago
What type of hardware enables users to interact with a computer? Check all that apply. the CPU the hard disk drive the keyboard
valentina_108 [34]

Answer:

the keyboard

the monitor

the mouse

Explanation:

just took test

6 0
4 years ago
Read 2 more answers
Your company deals with highly confidential information, some of which is transmitted via email among employees. Some documents
S_A_V [24]

Answer: AD RMS(Active Directory Rights Management Services)

Explanation: Active Directory Rights Management Services (AD RMS) is the tool for security that provides the protection of data .The security of data is maintained by the policies and regulation of data accessing that are implemented on data .

The working of the AD RMS is based on the RMS applications which encrypts the document and generates the regulation and stamp to collect them in an individual files.This helps in protecting the information that being created and consumed.

7 0
4 years ago
2. Now write a program named filereader.py that reads and displays the data in friends.txt. This program should also determine a
Andrew [12]

Answer:

see explaination

Explanation:

# python code filereader.py

import sys

import readline

from sys import stdin

import random

## Open the file with read only permit

f = open('inputfile.txt')

## Read the first line

sum = 0.0

count = 0

#read file till the file is empty

while True:

line = f.readline()

if ("" == line):

print "Average age of friends is", sum/count

break

list = line.split()

print "My friend ",list[0], " is", list[1]

sum = sum + int(list[1])

count = count + 1

f.close()

'''

inputfile.txt

Denny 24

Penny 28

Lenny 20

Jenny 24

output:

My friend Denny is 24

My friend Penny is 28

My friend Lenny is 20

My friend Jenny is 24

Average age of friends is 24.0

see screenshot at attachment

6 0
3 years ago
Other questions:
  • How can social media be used to find out about activities?
    5·2 answers
  • You have a subnetwork, 192.168.48.0/24. it is divided into subnet a and subnet
    8·1 answer
  • If a person was on board a hypersonic airplane what do you think they would be able to see as they look out a window looking in
    13·2 answers
  • Which of the following is an electronic device, operating under the control of instructions stored in its own memory, that can a
    6·1 answer
  • The growing network of physical objects that will have sensors connected to the Internet is referred to as the ________.
    13·1 answer
  • When an Item is base lined, it becomes frozen, here frozenmeans that only creating an old version can change the item
    9·1 answer
  • Write any four difference between email and effects​
    14·1 answer
  • Assignment Guidelines
    12·1 answer
  • Complete the sentence.
    10·1 answer
  • The specific instructions that a computing device needs to boot up and control the hardware
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!