1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
attashe74 [19]
3 years ago
9

How did mark watney survive the accident

Computers and Technology
1 answer:
VladimirAG [237]3 years ago
5 0
.............. one second
You might be interested in
__________ filtering requires that the filtering rules governing how the firewall decides which packets are allowed and which ar
DIA [1.3K]

Answer:

Static

Explanation:

A computer or system administrator who want packets to be filter have to set or configured a filtering rules which will enable and allow the firewall to decide on which of the packets that will be allowed to function and the packets that will be denied not to function to be developed and as well installed on the firewall have to make use of what is called STATIC FILTERING reason been that STATIC FILTERING make it of necessary that the filtering rules should be developed and installed with the firewall.

6 0
2 years ago
PARTNERING AS IT RELATES TO BPR.​
balandron [24]

Answer:

The answer to this question can be defined as follows:

Explanation:

The term BPR stands for "business processes reengineering", It is the recreating of the core business process to improve product performance or reliability or lower costs.

  • It generally includes analyzing business processes, which identifying sub-par or ineffective processes but identifying ways to dispose of or change it.
  • IT important for improving changes, especially to shift in aspects of the work, its incorporation in business operations, or competitive strength change.
  • It might contribute to making reconfiguration improvements, and is known as a BPR enabler.
6 0
3 years ago
Write your code to define and use two functions. The Get User Values function reads in num Values integers from the input and as
ZanzabumX [31]

Answer:

#include <iostream>

#include <vector>

using namespace std;

/* Define your function here */

vector<int> GetUserValues(vector<int>& userValues, int numValues) {

  int tmp = 0;

  vector<int> newVec;

 

  for(int i = 0; i < numValues; i++) {

     cin >> tmp;

     newVec.push_back(tmp);

     

  }

 

  return newVec;

}

void OutputIntsLessThanOrEqualToThreshold(vector<int> userValues, int upperThreshold) {

  for (int i = 0; i < userValues.size(); ++i) {

     if(userValues.at(i) < upperThreshold) {

          cout << userValues.at(i) << " ";

     }

  }

 

  cout << endl;

}

int main() {

  vector<int> userValues;

  int upperThreshold;

  int numValues;

 

  cin >> numValues;

  userValues = GetUserValues(userValues, numValues);

  cin >> upperThreshold;

  OutputIntsLessThanOrEqualToThreshold(userValues, upperThreshold);

  return 0;

}

Explanation:

Perhaps their is a better way to code this, but I couldn't figure out what to do with the pointer in the first function.

6 0
3 years ago
7. Application software is a program or group of programs designed for end-users.<br> True<br> False
Genrish500 [490]

Answer:

True

Explanation:

A software refers to "instructions that tell a computer what to do. Software comprises the entire set of programs, procedures, and routines associated with the operation of a computer system" (Encyclopedia Britannica).

There are two types of software;

i) system software

ii) Application software

An application software helps the user to perform specific tasks on the computer. It was specifically designed for the end user.

A typical example of an application software is the Microsoft office which could be used to prepare documents using the computer.

5 0
3 years ago
The term integration refers to the ability to
Ratling [72]
Transfer information from one type of program to another.
8 0
3 years ago
Other questions:
  • The numbers on the bottom of a typical check represent all of the following EXCEPT?
    12·2 answers
  • When the packet leaves the router, which source and destination ip addresses will be contained in the packet?
    9·1 answer
  • In an ha configuration, which two failure detection methods rely on icmp ping? (choose two.)
    12·1 answer
  • A good first step to understanding any kind of text is to :
    6·1 answer
  • Amy would like to find all records that were delivered on August 8, 2008. Her database has a field that tracks when the items we
    5·2 answers
  • Which of the following is the core of an operating system that maintains the computer’s clock, starts applications, and assigns
    5·1 answer
  • Where is permanent data in the computer stored? Whenever Jim starts his laptop, he sees some commands and numbers appearing on h
    6·1 answer
  • HELP PLS
    5·2 answers
  • JAVA NEED HELP ASAP
    7·1 answer
  • Cultural differences may make it difficult for team members to _____. Select 4 options.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!