1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kati45 [8]
4 years ago
5

Look act the picture

Computers and Technology
1 answer:
VLD [36.1K]4 years ago
3 0

Answer:

the answer is b

Explanation:

You might be interested in
Assume that an Internet service provider (ISP) intentionally disclosed the contents of a lawful private e-mail message without c
Alexus [3.1K]

Answer:

Electronic Communications Privacy Act of 1986

Explanation:

<em>Electronic communications</em> involve the transfer of data, sounds, images, writing, signals, signs or any form of intelligence radio wire or any other means.

The Electronic Communication Privacy Act of 1986 (ECPA) was passed into law by the US Congress to further restrict inappropriate wiretaps of electronic data or telephone calls and also, prohibit access to stored electronic communications. They further added pen-trap provisions that allow the tracing of communications over the telephone.

All these were put in place to primarily prevent unauthorized access to government communications.

If an Internet Service Provider (ISP) intentionally discloses the content of a lawful private email message without consent, they have violated the Electronic communication Privacy Act of 1986 (ECPA).

4 0
3 years ago
1. Declare two dimensional double array with 3 rows and 4 columns. a) Use scanf to read the elements for this array. b) Write a
Kobotan [32]

Answer:

Following are the program in the C Programming Language:

#include <stdio.h> //header file

float avgs(int a[3][4]){ //define function

 int s =0, c=0; //set integer type variable

 float avg=0;   //set float type variable

 //set for loops to find sum of an array

 for (int i = 0; i < 3; i++){

   for (int j = 0; j < 4; j++){

   s = s + a[i][j];

   c +=1;

   }

 }

 //find average of an array  

 avg = s / c;

 return avg;

}

int min(int a[3][4]){//define function

 int m = a[0][0];  //set integer type variable  

 //set for loop for traversing

 for (int i = 0; i < 3; i++)

 {  for (int j = 0; j < 4; j++){

     if(m > a[i][j])

       m = a[i][j];

   }

 }

 return m;

}

int main(){//define main function

 int a[3][4];//set integer type Array

 printf("Enter the elements of an array:\n");

 for (int i = 0; i < 3; i++)

  for (int j = 0; j < 4; j++)

     scanf("%d", &a[i][j]);

 printf("\n Average of an array: %f", avgs(a));

 printf("\n Smallest element of an array: %d", min(a));

 return 0;

}

Explanation:

Here, we define header file "stdio.h" for print or scan the data.

Then, we define float type function "avgs()" for find the average of an array inside it.

  • we set two integer type variable for sum and count
  • we set float type variable to store average of an array
  • we set the for loops for the sum of an array.
  • we divide sum from count to find average and return it.

Then, we define integer type function "min()" to find the minimum value of an array.

  • we set integer type variable to store array elements
  • we set the for loops for traversing the array
  • we set if statement to find minimum value of an array.
  • we return the minimum value of an array.

Then, we define integer type "main()" function to call both the functions.

  • we set integer type array variable and get input from the user in it with the help of for loops.
  • we call both the functions with message and return 0.

8 0
4 years ago
How is Storm chasing technology advanced? How is it becoming more advanced?
zhuklara [117]
Storm chasing has become more advanced because of the new technology created. One helpful tool is weather ballons. These ballons can track change in the atmosphere and can help predict tornadoes. Another form of useful technology is the cars now used. The new cars used have a ton of new updates, such as drills that can go into the ground, better radios, and the truck is now much heavier. Overall form chasing has become much more advanced and safer
7 0
3 years ago
What is a best practice when approaching an automation effort?
Sauron [17]
Not sure bro. What’s the question reslly about?
5 0
3 years ago
What does the % math operation do?
Nataliya [291]

Answer:

The percentage sign %, called modulo (or the remainder operator) is a operator which will find the remainder of two numbers x and y.

Explanation:

3 0
3 years ago
Other questions:
  • What is telepresence
    8·1 answer
  • Which other capabilities do many wireless access points have? Choose two answers.
    9·1 answer
  • Help thanks appreciate it
    12·1 answer
  • List the six external parts of a computer system and identify which are output and which are input devices.
    13·1 answer
  • Complete the steps to evaluate the following
    13·2 answers
  • Which Cisco IOS command is used to disable a device from performing naming lookups?
    11·1 answer
  • Consider the following code example:
    12·1 answer
  • What’s some insider knowledge that only people in your line of work have?
    13·2 answers
  • The following are three possible logon scenarios. Explain why option (c) below is preferable in terms of system security. a. Wel
    12·1 answer
  • What makes an operating system the master controller
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!