1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Cerrena [4.2K]
3 years ago
12

Write a program that produces the following output:

Computers and Technology
1 answer:
Bess [88]3 years ago
3 0

Answer:

ccccccccc+ccccc

Explanation:

uhh idk

You might be interested in
The key to security policy is being able to measure compliance against a set of controls. Security controls define _____ ______
Virty [35]

Answer:

The correct words for the blank spaces are: how; why.

Explanation:

In computer science, security control implies all the efforts of how organizations prevent, detect, and attack risks to safeguard sensitive information. Security policies establish why those actions are taken and set a list of all the assets that must be protected in front of a breach.

8 0
4 years ago
Suppose the inventory is unordered (!) and a sequential search is done to locate a specific artifact. Given that the search is e
lana [24]

Answer:

The computer can do 12000 searches per second. Suppose there are 60000 inventory items. And we need to search one item from it in a sequential manner. The computer can do 12000 searches in one second. Hence it can search in a list of 60000 inventory in 5 seconds, as 12000 x 5 =60000 searches, in the worst case. And if the item is below 12000 on the list, it will take less than 1 second(1/12000 sec in best case), and so on.

And if we assume that the list is sorted, and perform a binary search. then in the worst case, the number of searches required in the worst case will be 60000/2= 30000. And the time required will be 30000/12000= 5/2=2.5 seconds, and (1/24000) seconds in the best case. Its 1/24000 as its binary search.

Explanation:

Please check the answer section.

6 0
3 years ago
How old is the oldest asian
fomenos

Answer:

100000000000000000000000000

7 0
4 years ago
Read 2 more answers
When was Imagine dragons created
Eva8 [605]
They started at 2008                                            
5 0
3 years ago
Nano,Shuffle,Classic and Touch are variations of what?
dlinn [17]
They are variations of iPad
7 0
3 years ago
Other questions:
  • How do you fix a computer
    12·1 answer
  • If I add a # symbol in front of the cells row/column, it will keep the value true.
    14·1 answer
  • Why should you not perform any personal grooming task while driving?
    5·2 answers
  • On what basis can you categorize the generations of computers?
    11·1 answer
  • 8. When requesting a review of a denied claim, it is required to send a _______________ with the claim.
    10·1 answer
  • Advantages and disadvantages of using the command-line interface to manage files and folders
    14·1 answer
  • Is number 1 correct​
    7·2 answers
  • A computer scientist creates an app that tells you a funny joke each time you touch the Joke button.
    15·1 answer
  • SOMEONE PLEASE HELP ME WITH THIS !!!!
    6·1 answer
  • What sort of technique would you use to sort 10,000 items using just 1000 available slot in your RAM?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!