1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yawa3891 [41]
2 years ago
7

What type of engineer is needed in the following scenario?

Computers and Technology
2 answers:
OlgaM077 [116]2 years ago
4 0

Answer:

Software Engineer

Explanation:

den301095 [7]2 years ago
3 0

A) Hardware engineer


You might be interested in
Lucas wants to expand his vocabulary to better understand the sentence below. The insidious burglar moved through the house unhe
olga nikolaevna [1]

Answer:

B unheard & unseen

Explanation:

3 0
2 years ago
Read 2 more answers
In an array based implementationof a queue a possible solution to dealing with the full condition is to
kati45 [8]

Answer:

D. Maintain a count of queue items.

Explanation:

For checking the full condition of a queue you have to  check whether the number of elements in the array are equal to the size of the array.If they are equal then we can that the queue is full.

Checking frontindex equal to backindex is for checking if the queue is empty.

In option C we have to check for arrayFullException but it will not be a good approach.

So we conclude by saying that the answer is option D.

6 0
3 years ago
What is the main function of the output on a computer or what is it use for? ​
choli [55]

Answer:

It is used to transfer data

Explanation:

An output used on a computer is used for transferring your data from your device to another by any user

3 0
2 years ago
Read 2 more answers
Ead the following scenario and then answer the question.
Evgen [1.6K]
The answer is D. hard drive
4 0
2 years ago
Which are among the ways you can use bitlocker encryption? (choose all that apply?
igor_vitrenko [27]
There is a lot of ways that you can use the bit locker encryption. Some are when you are authenticating your computer using a TPM. Or when you are authenticating your account using a USB Flash drive, and most on the phones authentication through text messages and all.
3 0
3 years ago
Other questions:
  • An array name and index are separated using ____.
    13·1 answer
  • Answer all 1).The most common layout of keys on the keyboard is the _____ keyboard. ASDF QWERTY JKL QWOPY,
    5·2 answers
  • Media messages are communicated through which of the following:
    8·2 answers
  • The command button to protect a document is part of the​.
    10·1 answer
  • "A ____ is a collection of hardware and other devices that are connected together so that users can share hardware, software, an
    5·1 answer
  • Complete the sentence about entering and editing data in a cell in a spreadsheet.
    13·1 answer
  • NEED HELP
    9·1 answer
  • Complete the sentences describing a computer innovation.
    6·1 answer
  • Assume that x and y are boolean variables and have been properly initialized. !(x || y) || (x || y) The result of evaluating the
    10·1 answer
  • Are you absent minded because you are thinking of an online activity?​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!