1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gennadij [26K]
3 years ago
10

ANSWER QUICKLY!

Computers and Technology
1 answer:
patriot [66]3 years ago
7 0

Answer:

It is bit { measurement used to quantify computer data. }

You might be interested in
.All of the following are true with the respect to implicitinvocation except:
katrin2010 [14]

Answer: D) components are instances of abstraction

Explanation:

As, implicit invocation is the process by which it is used by the the software designer for styling the architecture of the software,where the event handling structured are formed in the system. The main aim of the implicit invocation is to separated the conceptual concern for maintaining or improving the ability of the software engineer. It is basically based on the notion of the broadcasting and based on the event driven. The components are the instance of the abstraction which are not used as the components in implicit invocation which are relinquished control the system over the computational performance,this is the major disadvantage of the implicit invocation.  

6 0
3 years ago
Why do you think it is important to consider ethical considerations when reviewing technology and assessing the impact of partic
IgorLugansk [536]

Answer:

The correct answer should be: "It is important to reaffirm and test technologies' importance and impact to society in order to reflect upon their benefits or damages to the environment".

Explanation:

Technologies have a major importance in society nowadays, although they also have a great impact in the environment, whether for good or not. The fact is that reviewing and assessing technologies' importance and impact are necessary to test and garantee if they have been developed in an environmental friendly manner or with no worries for natural resources and society. Therefore, any technology must be ethical in terms of improving society with no damages, or as least as possible, to the environment.

(ps: mark as brainliest, please?!)

7 0
3 years ago
Ano ang dalawang paraan sa paggawa ng abono?​
Bas_tet [7]

Answer:

im sorry i dont understand

Explanation:

5 0
3 years ago
You enter the show ipv6 route command on an ospf device and the device displays a route. which conclusion can you draw about the
salantis [7]
<span>OSPFv3 is in use.......</span>
4 0
4 years ago
Which of the following is not a legal identifier?
Paraphin [41]

Answer:

321Go

Explanation:

The identifiers in C, C++, C#, Java and other programming languages are a combination of letters, numbers and the underscore symbol.  The laters versions of C and C++ allows you to use almost all Unicode characters. In Java, you can use also the dollar sign.

From that you have to be careful to follow these rules:

-Don't use keywords.

-Don't include white spaces.

-Don't use operators.

-Don't repeat identifiers.

-Don't start your identifier with a number.

-Don't use two consecutive underscores.

So app_234, happyTimesAhead, and cis22B are follo wing these rules but 321Go starts with a number.

4 0
3 years ago
Other questions:
  • A file that contains program code is called a ____________.
    13·1 answer
  • Identify the mobile device deployment option that gives the user flexibility to select a device, but allows the company to contr
    5·1 answer
  • Please code this in c++
    10·1 answer
  • Software enables users to create documents
    13·1 answer
  • HELP PLZZZZZZZZ!!!!!!!!!!!
    14·1 answer
  • True or False: Mapping annotations are exclusive - an annotated method will only be accessible to requests sent to a matching UR
    14·1 answer
  • Compare and contrats the vain digestive system from the human digestive system.​
    10·1 answer
  • Jerry purchased 25 dozens of eggs. He used 6 eggs to bake 1 cake. How
    14·1 answer
  • You have a passage of text that needs to be typed out, but some of the letter keys on your keyboard are broken! You're given an
    14·1 answer
  • Why is it important to continiously conduct penetration testing for a strong security system?.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!