1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
viva [34]
3 years ago
12

Type the correct answer in the box. Spell all words correctly.

Computers and Technology
1 answer:
kari74 [83]3 years ago
6 0

Answer:

An amplifier or amplifying

Explanation:

An amplifier, electronic amplifier or (informally) amp is an electronic device that can increase the power of a signal (a time-varying voltage or current).

You might be interested in
What are two critical properties for a cryptographic hash function?
AleksandrR [38]

Answer:

The ideal cryptographic hash function has four properties: it is quick to compute the hash value for any given message. it is infeasible to generate a message from its hash value. it is infeasible to modify a message without changing the hash value.

3 0
3 years ago
Very complex type of processing is carried out by a which computer.
avanturin [10]

Supercomputers are used to process very complex type of processing. They are very powerful computers.

<h3>What are supercomputers?</h3>

Supercomputers are powerful computers that have very high processing and performance. They work very fast with in a fraction of second. They are used to doing heavy calculation and work.

Thus, the supercomputers are used to process very complex type of processing.

Learn more about supercomputers

brainly.com/question/23126369

#SPJ1

4 0
2 years ago
What is meant by close to 75% of all viruses is contracted through friendly means?
snow_lady [41]

Answer: This means that even though we believe the information is coming from a trusted source, it could still contract a virus due to someone else hacking it or the original sending not being aware of the virus.

Explanation: Just because information comes from a trusted/friendly source does not mean the information is clear of potential threats. Viruses are able to hide in information and the sending may not be aware that the virus is hiding in the information.

4 0
4 years ago
This is your code.
guapka [62]

Answer:

35

Explanation:

List E is a 2 dimensional array. We want index 1 of E, which is B. Now we have an index of that list B, it is index 0 so 35.

7 0
3 years ago
write a c program to insert and delete values from stack( to perform pop and push operations) using an array data structure
Alexxx [7]

Answer:

<u>How to implement a stack in C using an array?</u>

A stack is a linear data structure that follows the Last in, First out principle (i.e. the last added elements are removed first).

This abstract data type​ can be implemented in C in multiple ways. One such way is by using an array.

​Pro of using an array:

No extra memory required to store the pointers.

Con of using an array:

The size of the stack is pre-set so it cannot increase or decrease.

3 0
3 years ago
Other questions:
  • In a survey of 7200 T.V. viewers, 40% said they watch network news programs. Find the margin of error for this survey if we want
    6·1 answer
  • Which tool is an easy way to navigate between rows of data in an Access table and is found in the status bar?
    9·1 answer
  • Click _______ to view each individual record of a mail merge document.
    5·2 answers
  • The atomic number of oxygen is 8. the atomic mass of oxygen is 16. him many neutrons does oxygen have
    12·1 answer
  • Which of the following are true about the PUSH instruction?
    9·1 answer
  • ACL 1 has three statements, in the following order, with address and wildcard mask values as follows: 1.0.0.0 0.255.255.255, 1.1
    6·1 answer
  • If a football player had to use the restroom during a play what do they do?
    13·1 answer
  • Import java.util.ArrayList;
    14·1 answer
  • Which of these is not a valid form<br>layout in Microsoft Access?​
    11·1 answer
  • Daily IT Question
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!