1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bess [88]
3 years ago
13

What do vector handles point at?

Computers and Technology
2 answers:
scoundrel [369]3 years ago
8 0

Answer:

la b

Explanation:

por lo que seel  setoobj  as cercano

mylen [45]3 years ago
7 0

Answer: I think the answer is A

Explanation:

If i'm wrong i'm sorry

You might be interested in
Juhfvehrfwhedfhwkefhkujhiuyuiyuiyiyh
maw [93]

Answer:

blah

blah

blah..⁉️

Explanation:

juhfvehrfwhedfhwkefhkujhiuyuiyuiyiyh

⁉️

8 0
3 years ago
Consider the following code segment.
m_a_m_a [10]

Answer:

10 20                                                                                                                          

30 40                                                                                                                          

50 60

Explanation:

Given

The above code segment

Required

What is printed, if anything

To do this, we analyze the code line by line.

Line 1: The first line creates a 4 by 3 array named mat

Line 2: for (int[] row : mat) {  -> This creates row[] array which represents each row of array mat

Line 3: for (int j = 0; j < row.length; j += 2){ -> This iterates through the even indexed elements of the row array i.e. 0 and 2

Line 4: System.out.print(row[i] + " "); -> This prints the even indexed elements of the row array.

The even indexed elements are: 10, 20, 30, 40, 50 and 60

Line 5: System.out.println(); --> This prints a new line

8 0
3 years ago
Can you think of a situation that might create a problem for a website’s security? What could a back-end developer do to prevent
Yuki888 [10]

A situation that might create a problem for a website’s security is known o be  as a result of Outside people having access to a companies website and documents and also hackers hacking into a company database.

Others are;

  • Lack of authentication in company security.
  • Access control-linked misconfigurations.
  • A Software misconfigurations.

<h3>What could a back-end developer do to prevent this situation from occurring?</h3>
  • Always Encrypt sensitive data:
  • Do not use weak encryption algorithm.

The back end in cyber security is know to be a sort of a kind of a repository of all that entails your web presence and also that of your mobile apps and it is one that makes it to run smoothly.

Hence, A situation that might create a problem for a website’s security is known o be  as a result of Outside people having access to a companies website and documents and also hackers hacking into a company database.

Learn more about website’s security from

brainly.com/question/10450768

#SPJ1

4 0
2 years ago
Can. you please help me with this ​
slava [35]

Answer:

the answer is A

7 0
3 years ago
define the physical components of hardware for a computer system,including identifying internal hardware devices(e.g. processor,
kap26 [50]

Answer:

Explanation:

The necessary hardware components that a computer requires to run properly are the following.

Motherboard, this is the main circuit board that interconnects all of the components and allows them to interact with each other.

CPU, this is the brain of the computer where all calculations and processes are handled.

Video Card, this component handles all the visual data, rendering that the computer needs in order to get a proper image.

RAM, these components are the physical memory where temporary data is stored and used.

Hard Disk, this is the main storage drive where all your data will be saved including the operating system.

PSU, this is the power supply of the unit that distributes the correct amount of power to every other component in the system.

Sound Card, this component handles all the input and ouput audio signals for a computer.

7 0
3 years ago
Other questions:
  • Will give brainliest and good amount of points, no false answers.
    5·1 answer
  • public class BaseballTeam { private String city, mascot; private int numberOfPlayers; @Override public boolean equals(Object obj
    10·1 answer
  • Sam wants to move from his current role in his organization to a managerial role. Which certification will help him get on a man
    6·1 answer
  • What is the name of the keyboard developed in the 1930s?
    13·1 answer
  • What version of android did nexus one run?
    14·1 answer
  • The engineering firm you work for is submitting a proposal to create an amphitheater at a state park. Proposals must be submitte
    15·1 answer
  • How much memory will be occupied by black and white image​
    8·2 answers
  • What is the operation of mouse in which it is moved while holding left button.​
    11·2 answers
  • The data model shows the_______structrue of database.​
    14·1 answer
  • 5. What are some situations where you might find it useful to use the “!” symbol in a program?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!