1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nlexa [21]
3 years ago
8

What year did bill gates form traf-o-data?

Computers and Technology
1 answer:
alexgriva [62]3 years ago
8 0

In 1972 Bill Gates formed Traf-O-Data.

You might be interested in
Which type of database program is Microsoft Access 2016?
nadya68 [22]

Answer:

O relational

Explanation:

If I'm wrong I'm so so sorry! But form my research it keeps saying its relational.

If I'm right please give me brainliest I really need it to level up so please help me!

If you don't know how to give brainliest there should be a crown underneath my answer you just have to click it.

Thank you and have a wonderful night,morning,afternoon/day! :D

6 0
3 years ago
Read 2 more answers
Co to jest podprogram (procedura lub funkcja)? Zaznacz poprawną odpowiedź. a) Wielokrotne powtarzanie tych samych poleceń. b) Wy
ale4655 [162]

Answer:

  b)  A separate part of the program that performs a specific task.

Explanation:

A subroutine is a portion of the program that can be invoked to perform a specific task. Typically, it performs that task and returns execution control to the point immediately following its invocation. It may or may not maintain "history" or "state", and it may or may not throw exceptions.

A well-behaved subroutine will only operate on data passed to it, will not maintain any internal history or state, and will have only one exit.

8 0
3 years ago
Write a function which sorts the queue in order from the smallest value to the largest value. This should be a modified version
PilotLPTM [1.2K]

Answer:

#include <iostream>

using namespace std;

void swap(int *a,int *b){    //function to interchange values of 2 variables

   int temp=*a;

   *a=*b;

   *b=temp;

}

void sort(int queue[],int n)

{

   int i,j;

   for(i=0;i<n;i++)      //to implement bubble sort

   {

       for(j=0;j<n-i-1;j++)

       {

           if(queue[j]>queue[j+1])

               swap(queue[j],queue[j+1]);    //to swap values of these 2 variables

       }

   }

}

int main()

{

   int queue[]={6,4,2,9,5,1};

   int n=sizeof(queue)/4;  //to find length of array

   sort(queue,n);

   for(int i=0;i<n;i++)

       cout<<queue[i]<<" ";

   return 0;

}

OUTPUT :

1 2 4 5 6 9

Explanation:

In the above code, Queue is implemented using an array and then passed to a function sort, so that the queue can be sorted in ascending order. In the sort function, in each pass 2 adjacent values are compared and if lower index value is greater than the higher one they are swapped using a swap function that is created to interchange the values of 2 variables.

7 0
3 years ago
Alright Just Bought A Sig Sauer BB Pistol Model P365 Compact And Field Stripped It Now The Slide Is Broken Please Help
viva [34]

Answer:

I'm sure you'll find the answer your looking for on a diffrent site other than brainy

6 0
3 years ago
Which one of the following statements is true regarding the fetch-execute cycle? Each step of the fetch-execute cycle is perform
AfilCa [17]

Answer:

The device responsible for performing the fetch-execute cycle is the CPU.

Explanation:

The fetch execution cycle is the way or method the CPU executes instructions given to it. In this process or cycle, the CPU fetches the instruction, then decodes it, executes it, and stores the information in its database.

The CPU executes one instruction at a time.

8 0
4 years ago
Other questions:
  • Why does the PC send out a broadcast ARP prior
    14·1 answer
  • What are some good invention names for an air filter?
    14·1 answer
  • Which process alters readable data into unreadable form to prevent unauthorized access known as?
    8·1 answer
  • How can a network design project benefit from the principles of itsm? How might itsm impede a network design project?
    11·1 answer
  • Which feature of a blog marks a unique link to each post through which it can be recalled anytime?
    8·2 answers
  • The principal objectives of computer security are to prevent unauthorized users from gaining access to resources, to prevent leg
    11·1 answer
  • What helps in determining the reliability of a person to repay debt?
    13·2 answers
  • Which platform is dedicated to Customer Relationship Management (CRM)?
    7·1 answer
  • 1. What is a digital networking app?
    12·2 answers
  • Which statement describes the Direction option for animations and transitions?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!