1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
WINSTONCH [101]
3 years ago
9

Which of these is NOT an advantage of the impact of computer careers.

Computers and Technology
2 answers:
lianna [129]3 years ago
5 0
The answer is the first choice
nikdorinn [45]3 years ago
4 0
I believe the answer could be the first choice. I'm not quite sure, though
You might be interested in
To increase security on your company's internal network, the administrator has disabled as many ports as possible. Now, however,
tia_tia [17]

Answer: 443

Explanation:

Port 443 will need to be enabled for secure transactions to go through because it is the default port for HTTPS which is the transfer protocol for secure communication.

This way your credit card transactions will be encrypted to ensure protection from those who would seek to steal your data and your money.  

8 0
3 years ago
Tanner is creating a brochure for his Web-hosting company. He designed the layout and placed a picture in the center of the page
Romashka [77]
Resizing is a very simple process. On the photo editing program, simply click on the image, and if resize handles appear around it, click and drag those to the desired size. If the program has a dedicated resizing or rescaling tool, use it and follow the above instructions. Keep the photo proportionate by holding down the shift key while dragging a corner handle. <span>Tanner has to make sure that his photo his of a high enough resolution to resize. A pixellated or blurry photo will only get worse when scaled up. He also has to make sure he doesn't resize it to be too big or it will also end up pixellated.</span>
5 0
4 years ago
How to convert mkv to avi without losing quality?
Alexus [3.1K]
Ive done this before with success.
You will need <span>FFmpeg.</span>
https://superuser.com/questions/227338/how-to-convert-an-mkv-to-avi-with-minimal-loss
7 0
3 years ago
A string is represented as an array of characters. If you need to store an array of 5 strings with the maximum length of a strin
erastova [34]

Answer:

char str[5][100]

Explanation:

See attachment for options:

From the options, we can see that the programming language is C language.

The syntax to store an array of m strings with a maximum of n elements in C is:

char array-name[m][n]

In this case:

m = 5 --- Number of strings in the array

n = 100 --- Maximum character in each string

Assume the array name is str, the syntax can be expressed as:

char str[5][100]

3 0
3 years ago
Because one memory location can be used repeatedly with different values, you can write program instructions once and then use t
CaHeK987 [17]

Answer:

True.

Explanation:

The statement written in the question is True.We can use one memory location and use it with different values.

For example:- When we are using a loop be it for,while or do-while.The counter that we use for iteration is one and we use that counter to run the loop.We are using a single memory location and we are updating the count in that memory location many times.

for(int i=0;i<1000;i++)

{

     //body.

}

We are using i's memory location and changing it 1000 times.

3 0
3 years ago
Other questions:
  • Shelly praised Susan via email for how well she executed an employee training program last week. Shelly is engaging in the _____
    6·1 answer
  • List two ways that guest could be defined
    12·2 answers
  • What is the operating system?
    9·1 answer
  • Which presenter would most likely benefit from a custom slide show?
    10·2 answers
  • c++ You are given an array A representing heights of students. All the students are asked to stand in rows. The students arrive
    5·1 answer
  • Which piece of computer hardware was revised to run hypervisors natively?
    12·2 answers
  • Web résumés are posted to the Internet in HTML format.<br> true or false
    9·2 answers
  • PLS ANSWER ASAP!!!! <br><br> In three to five sentences, explain the function of utilities.
    13·1 answer
  • Which type of evidence should victims collect to help officials catch cyber bullies?home addressesbirthdayssocial media username
    15·1 answer
  • A small network that consists of devices connected by Bluetooth, such as a smartphone and a computer, is referred to as a ______
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!