1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sever21 [200]
3 years ago
14

To use a resource from a module, you write the name of the module as a qualifier, using which symbol before the name of the reso

urce?
a. =
b. ''
c. *
d. .
Computers and Technology
1 answer:
Sladkaya [172]3 years ago
7 0

Answer:

d. .

Explanation:

Dot (.) symbol is used to access the resource from the module. It is used to establish the connection between resource and module.

While on the other hand "=" is an assignment operator that is used to assign a value to the variable. "*" is use for the purpose of multiplication of two values in variables. Double Inverted commas ("") used to print the statement written between them.

You might be interested in
There are many opportunities for unscrupulous people to break information system security. Of the five components in an informat
7nadin3 [17]

The answer is letter e.

People is the component poses the very large ongoing security risk. It also can be a threat to the safety. People play an essential part in most operational systems and methods. Information, ability and mental outlook often determine the feature and quantity of system output. Just as a stereo requires the right component, high-performance business systems require the right fit of people to work.


8 0
3 years ago
Read 2 more answers
This week you will learn about basic code structure. The term structure, as it relates to programming, refers to the decisions y
GenaCL600 [577]
Instead of having to write multiple pieces of code for different outcomes, you can use an elseif statement and make your code easier to read and easier to understand.
8 0
4 years ago
1. provides a list of at least five SSIDs and the
taurus [48]

One of the most important ways to provide wireless security is through:

  • The use of encryption.

<h3>What is Wireless Security?</h3>

This refers to the network authentication and use of encryption to secure a network from unauthorized access or compromise of the network by an external agent.

With this in mind, we can see that SSID is a WiFi network name and it makes use of WPA2 security encryption to protect the wireless network through wireless encryption protocol.

Please note that your question is incomplete so I gave you a general overview to help you get a better understanding of the concept.

Read more about wireless security here:
brainly.com/question/14449935

8 0
2 years ago
What will be the value of x after the following code is executed? int x = 10; do { x *= 20; } while (x &lt; 5); A. 10 B. 200 C.
dezoksy [38]

Answer:

Option B is the correct answer.

Explanation:

  • In the above code, the loop will execute only one time because the loop condition is false and it is the Do-While loop and the property of the Do-while loop is to execute on a single time if the loop condition is false.
  • Then the statement "x*=20;" will execute one and gives the result 200 for x variable because this statement means "x=x*20".
  • SO the 200 is the answer for the X variable which is described above and it is stated from option B. Hence it is the correct option while the other is not because--
  1. Option A states that the value is 10 but the value is 200.
  2. Option C states that this is an infinite loop but the loop is executed one time.
  3. Option D states that the loop will not be executed but the loop is executed one time
6 0
3 years ago
Read 2 more answers
The first generation of computers used vaccum tubes .Why were they replaced by the transistors​
suter [353]

Answer:

hiiiiiiiiiiiiiiiiiiiiiiiiiii

7 0
3 years ago
Read 2 more answers
Other questions:
  • Select the tips you should follow when creating a newsletter.
    13·1 answer
  • What does the cpu do (in terms of register contents and stack) when it executes a jsr instruction?
    12·1 answer
  • Intro to Computers quiz answers me need for test please help me hurry
    5·1 answer
  • Which type of computer are todays most widely used personal computers?
    8·2 answers
  • ____ presents a comprehensive model for information security and is becoming the evaluation standard for the security of informa
    5·1 answer
  • Arrange the types of movies in terms of the amount of content they can hold
    14·1 answer
  • Discuss the term internal control​
    12·1 answer
  • How to get the lightning round in dares of eternity
    5·1 answer
  • A process spawning or initiating another process is referred to as _____
    8·1 answer
  • 3.12 LAB: Output range with increment of 5 Write a program whose input is two integers, and whose output is the first integer an
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!