1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
raketka [301]
3 years ago
10

A shopaholic has to buy a pair of jeans , a pair of shoes l,a skirt and a top with budgeted dollar.Given the quantity of each pr

oduct and the price per unit determine how many options of each item are present.if required all dollars are spent write the programming in c​
​
Computers and Technology
1 answer:
Rasek [7]3 years ago
4 0

Answer:

hfjgyyitjtjjtjtj*jj*jtjtjthrhrhfhffbf

You might be interested in
Discuss why diffrent user interface require the use of diffrent type of input device<br>​
Bas_tet [7]

Discuss why different user interfaces require the use of different types of input device. Page 15. What is Secondary Storage? List 3 Storage Mediums: What is ...

mark me brain list

7 0
2 years ago
The acronym LAH stands for
Nina [5.8K]
D.Limited Access Highway
5 0
3 years ago
Read 2 more answers
Global visibility is: Group of answer choices A visibility type where an object A has a semi-permanent reference to another obje
polet [3.4K]

Answer:

the visibility persists as long as both A and B exist.

Explanation:

Global visibility basically means that the visibility persists as long as both A and B exist. In programming global visibility signifies that the variable/data in question is visible from any context of the code. Meaning that it can be accessed and manipulated from any part of the code, even from within a function or another document. This makes it very easy to use and structure accordingly.

5 0
2 years ago
Which of the following solutions should an administrator use to reduce the risk from an unknown vulnerability in a third-party s
ser-zykov [4K]

Answer:

A. Sandboxing

Explanation:

The best solution to apply for this task would be Sandboxing. This is a software management strategy that isolates applications from critical system resources and other programs. In doing so you effectively add a secondary security layer on top of the application in order to prevent any and all malware from entering and damaging your overall system. Thus effectively reducing the risk.

4 0
3 years ago
There are two main types of hard drive available to a computer. State what they are and describe their use.
Gala2k [10]

Answer:

Hard disk drives (HDD), which use one or more rotating discs and rely on magnetic storage, and solid-state drives (SSD), which have no moving mechanical parts, but use flash memory like the kind found in USB flash drives.

Explanation:

6 0
2 years ago
Other questions:
  • Write a loop that reads positive integers from standard input and that terminates when it reads an integer that is not positive.
    10·1 answer
  • A(n) ____________________ is a set of programs that coordinates all the activities among computer or mobile device hardware.
    10·1 answer
  • True or false. Embedding only part of a font is called presetting.
    14·1 answer
  • When did the digital revolution begin
    10·1 answer
  • What is meant by encapsulating semaphores? Bring out the need for it
    12·1 answer
  • Creation of ____________will help you to study the behavior of the real system
    11·1 answer
  • What is the practical application of the information acquired by science.
    15·1 answer
  • What can macro mode on a camera be used for?
    12·2 answers
  • What is the answer ????​
    13·2 answers
  • When evaluating an AND operator, what is necessary for execution?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!