1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natalka [10]
3 years ago
5

is it really b because io dont need to make a bad grade on this everfi so please make sure this is right

Computers and Technology
1 answer:
GrogVix [38]3 years ago
6 0
You didnt post the answer choices. we cant answer.
You might be interested in
Write the following function without using the C++ string class or any functions in the standard library, including strlen(). Yo
Radda [10]

Answer:

See explaination

Explanation:

#include<iostream>

using namespace std;

const char* firstOfAny(const char *str1,const char *str2){

const char *p=str1;

while((*p)!='\0'){

const char *q=str2;

while((*q)!='\0'){

if((*p)==(*q)){return p;}

q++;

}

p++;

}

return p;

}

int main(){

cout<<firstOfAny("ZZZZuker","aeiou");

cout<<endl;

cout<<firstOfAny("ZZZzyx","aeiou");

return 0;

}

7 0
3 years ago
Shouldn't I be virtuoso? I keep refreshing and opening and closing tabs but it still hasn't updated
spin [16.1K]

Answer:

You are currently showing as a Virtuoso on your profile. Try clearing your cookies and logging back in.

5 0
2 years ago
Which term is defined as an exploit that takes place before the security community or software developer knows about the vulnera
Natasha_Volkova [10]

Answer:

A zero-day attack.

Explanation:

A Zero-day vulnerability is a computer-software vulnerability that is unknown to, or unaddressed by, the security community or software developer or even the vendor of the target software. Until the vulnerability is mitigated, hackers can exploit it to adversely affect computer programs, data, additional computers or a network.

An exploit directed at a software with zero-day vulnerability & exploiting this vulnerability is called a zero-day exploit, or zero-day attack.

3 0
3 years ago
If a packet gets "sucked down a black hole" (figuratively speaking) and is not received by its sender, and no message is sent ba
Serga [27]

Answer:

iso

Explanation:

3 0
3 years ago
What is the GCF of 48mn and 81mn??<br> O 3mn<br> O 3m?n<br> O 48mºn<br> O 129mn
vitfil [10]

Answer:

A. 3mn

Explanation:

48 divides by 2 48 = 24 x 2

then =2 x 2 x 12

then = 2 x 2 x 2 x 2 x 3

greatest factorization is 3 therefore,

3mn is the answer

8 0
3 years ago
Other questions:
  • Which type of cause and effect organizer would be best for alisha to understand how crude oil becomes gasoline?
    6·2 answers
  • Choose all that apply.
    6·2 answers
  • "A file named numbers.txt contains an unknown number of lines, each consisting of a single integer. Write some code that compute
    9·1 answer
  • When would it be easier to use Cut and Paste over Drag and Drop? Explain?
    6·1 answer
  • Which memory device is most appropriate for backing up a computer’s hard drive?
    11·2 answers
  • To update a bibliography field that is not contained in a ____, right-click the bibliography, and then click Update Field on the
    10·1 answer
  • Do you think<br> brain uploading<br> is a good idea?
    7·1 answer
  • What is the missing line?
    9·1 answer
  • What is the use of folders in the computer system ?​
    14·1 answer
  • Which will touch the ground first an elephant or a rock?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!