1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
trasher [3.6K]
3 years ago
15

What can I do with this? Lol

Computers and Technology
1 answer:
nikitadnepr [17]3 years ago
3 0
Do with what? If you have a question please contact me ;)
You might be interested in
Instructions:Select the correct answer.
VladimirAG [237]

B. audio file is the answer

5 0
3 years ago
Read 2 more answers
In terms of resource utilization, a /an application may require higher local
aksik [14]

Answer: A) Installed

Explanation: Installed application work on the system on which they are installed .They are supposed to persist the required speed of processing to execute the task ,enough memory and other resources as well to fulfill the need of the application functioning.

Other option is incorrect because cloud based application run with help of internet service via web browser so they resources in this applications based on the internet connectivity and browser's speed .Thus, the correct option is option(A).

3 0
4 years ago
Which of the following shows how to correctly declare pointer variable x?
QveST [7]

Answer:

declaration of pointer variables are done using *

Explanation:

* denotes the declared variable is a pointer which can hold address of another location. To get values of any address & is used. For example, we have an integer variable <em>a</em> to which holds a value 10. if you want to read the address of the variable <em>a</em>, use <em>&a</em>. To store this address in any other memory declare a pointer variable.

int a = 10;

int *loc_a;

loc_a = &a;

7 0
3 years ago
which dual-stack architecture allows ipv4 and ipv6 at the network layer to access a single tcp/udp stack
Archy [21]

The dual-layer-IP allows ipv4 and ipv6 at the network layer to access a single tcp/udp stack.

<h3>What is the dual IP layer?</h3>

The word dual-stack is a word that connote a full or total duplication of all stages in the protocol stack ranging from its applications to the network layer.

Note that the dual-layer-IP method often gives room for a computer to run IPv4 and IPv6 simultaneously  at the network layer, and all of the IP stack can access a different TCP/UDP stack.

Learn more about  architecture  from

brainly.com/question/9760486

6 0
2 years ago
1) Type a statement that gets an input value into variable numBers. Assume scnr already exists and numBers has been declared.
Sergio039 [100]

Answer:

Following are the code in the java language  

numBers = scnr.nextInt ( ) ;

Here scnr is an instance of scanner class .

Explanation:

In this code, we take the input by using the object of Scanner class i.e "scnr". The scanner class in the java programming language is used for taking the input by the user. The scnr.nextInt ( )  is taking the input which is stored in the  "numbers" variable.

So the whole program is looking like that  

import java.util.*; // import package  

public class Main

{

public static void main(String[] args) // main function

{

 int numBers; // variable declaration

 Scanner scnr=new Scanner(System.in); // create the instance of scanner class

 numBers=scnr.nextInt( ) ; // taking input

 System.out.println(numBers); // display the value of numBers

}

}

Output:

78

78

4 0
3 years ago
Other questions:
  • What is scientific and​
    13·2 answers
  • In which area of engineering does material selection play a vital role a design optimization b forensic engineering c mechanical
    6·1 answer
  • _____, which are generated by web server software, record a user's actions on a web site. viruses log files junk e-mails worms
    7·1 answer
  • The term median means
    9·2 answers
  • Which clauses in the Software Engineering Code of Ethics are upheld by a whistleblower (check all that apply). "Respect confiden
    15·1 answer
  • In the ____ letter style, all components of the letter begin flush with the left margin.
    5·1 answer
  • What is the missing line?
    9·1 answer
  • What is a banner grab?
    12·1 answer
  • What can you achieve if you divide your search engine marketing account into relevant campaigns and ad groups?.
    9·1 answer
  • A(n) _____ is a data validation rule that should be applied to mandatory data items.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!