1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
algol [13]
3 years ago
6

CB workorder

Computers and Technology
1 answer:
elena-14-01-66 [18.8K]3 years ago
3 0
The late seventeenth-century literary period known as the Restoration begins in 1660, the year in which the monarchy (and specifically, King Charles II) was restored to the English throne.
You might be interested in
Define a function OutputValues() that takes two integer parameters and outputs all integers between the first and the second par
iris [78.8K]

Answer:

#include <iostream>

using namespace std;

void OutputValues(int n1, int n2) {

 for (int i = n1; i <= n2; i++) {

   cout << i << endl;

 }

}

int main() {

 int num1;

 int num2;

 cin >> num1 >> num2;

 OutputValues(num1, num2);

 return 0;

}

Explanation:

8 0
3 years ago
Reflect on your semester in this class analysis and Design from an overall "experience" perspective
sergey [27]

Answer:

umm... I hate to break it to you but this is something you're gonna have to do on your own since the likelihood of someone being in your exact class is very low I mean people could write some random stuff in here but if it doesn't match up with what you learned in class then does it really even matter at that point? your teacher will know you cheated and will probably make you do it from scratch and will check thoroughly to make sure it's your work (if you're in highschool and/or the teacher is nice enough to give you a second chance) or just fail you completely (if you're in college and/or just have a really mean teacher who doesn't give second chances). so I recommend taking the time to do this yourself and not risking the consequences.

Explanation:

3 0
3 years ago
You work with alot of different documents in your internship with a software development company. What kinds of actions can you
Doss [256]

Answer:

Explanation:

Try as much as possible, to keep like files together in one folder. Even so there if you run into the hundreds or thousands, that is not going to be an easy thing do.

What ever you do, do clutter up your favorites bar, especially if your favorites spill over into where you have to push a button to get to them. Keep that bar open for what you really need on that bar. Mine has Brainly, Kitco, My Alberta Health, A graphing program, a second graphing program, Amazon, a scrabble word finder, and a couple of other things. It

If you can, try and keep your favorites to something that would be useless to anyone else. My favorites are worthless to anyone else. But I play a lot of scrabble related games.

7 0
2 years ago
La computadora es un medio de comunicacion moderno?
kolbaska11 [484]
Moderno = mordern, if It does than yes!
3 0
3 years ago
JAVA When simply determining the order of magnitude of an algorithm using Big-Oh algorithm analysis, an instruction that evaluat
OlgaM077 [116]

Answer:

True.

Explanation:

When determining the order of magnitude of an algorithm using the Big-Oh algorithm analysis.The instruction which evaluates to O(c) is equal to one that is O(1) because it is considered as constant time and to represent constant we use O(1) in  big-Oh notation.

Hence the answer to this question is True.

7 0
3 years ago
Other questions:
  • Having reviewed dod wireless stig (ver6, release 1), sarah learns she may only utilize secnet 54 and ______________ for transmit
    13·1 answer
  • Select the answers that best describe showing respect for confidential data. Check all of the boxes that
    10·1 answer
  • Write a program that asks the user for the names of two files. The first file should be opened for reading and the second file s
    13·1 answer
  • An experienced user has installed Oracle VM VirtualBox on her workstation and is attempting to use it to create a virtual machin
    6·1 answer
  • 1. Why is it important for IT technicians to keep documentation on computers for which they are
    13·1 answer
  • PLEASE HELP
    11·2 answers
  • What are some specific ways that businesses use the internet?
    6·2 answers
  • Carly’s Catering provides meals for parties and special events. Write a program that prompts the user for the number of guests a
    10·1 answer
  • When is 1600 plus 25 and 1700 minus 35 the same thing?​
    10·1 answer
  • Weak passwords are a(n) ___________ threat
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!