1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ioda
3 years ago
8

I need help on my binary search on khan academy plzzz help

Computers and Technology
2 answers:
Nastasia [14]3 years ago
7 0

Answer:

Explanation:

LOok CloSeR

crimeas [40]3 years ago
6 0

Answer: i don't get what you are asking

Explanation:

You might be interested in
________ computers are specially designed computer chips that reside inside other devices, such as a car. Select one: A. Tablet
BartSMP [9]

Answer:

The correct answer to the following question will be Option C (Embedded).

Explanation:

  • An embedded system seems to be a monitoring system that incorporates a computer processor, device storage, and peripheral output/input devices that have a particular function within such a larger electrical or mechanical network.
  • Such devices are chips that are designed specifically and live within other devices or appliances.

The other three solutions can not perform tasks like the embedded computers do or even any other computer can implement the computer's processor. Therefore, it's the right answer.

3 0
3 years ago
Read 2 more answers
How many fonts are there in a theme?<br> A. 1<br> B. 2<br> C. 4<br> D. 5
BlackZzzverrR [31]

B. 2

If incorrect, sorry

6 0
3 years ago
_____ includes a wide range of applications, practices, and technologies for the extraction, transformation, integration, analys
Alla [95]

Answer:

The answer is "Option a".

Explanation:

The B.I. is a method, methodology, software, and development set that makes raw data usable and relevant, which facilitates improved decision-making and competitive opportunities, and certain choices were wrong, which can be described as follows:

  • In option b, The A.I is uses in the machines, that's why it is not correct.
  • In option c, It is used to analyze the data, which used in business. that's why it is not correct.
  • In option d, It is wrong, because it a part of A.I.
6 0
3 years ago
Why does a HTML seen to work even when its broken? why does the code sometimes turn pink?
OverLord2011 [107]

the reason HTML seems to work even if it has syntax errors is due to browser having built in ways to parse the code meaning it will still show but most likely look way different then you would want.

the code may turn pink due to syntax errors

5 0
3 years ago
_______________ is used by a hacker to mask intrusion and obtain administrator permissions to a computer.
Sergeu [11.5K]

Answer:

Rootkit.

Explanation:

Rootkit is a collection of software tools,mostly malicious.These are mostly used by hackers to obtain administrator permission to a computer by masking intrusion.

Root-kit is made from two word Root and kit.Where root refers to the name of privileged account on an operating system that is somewhat like unix and KIT refers to the tools used.

6 0
3 years ago
Other questions:
  • This is the main work area of your computer.
    7·1 answer
  • 24 bit or 16 million colors is often called?
    7·1 answer
  • Object-oriented programs employ a group of techniques for handling errors called ________ handling.
    12·1 answer
  • For which type of long-distance call do you need to tell the operator the name of the person to whom you wish to speak?
    10·1 answer
  • To rotate text in a cell select the option in the alignment grouping
    9·2 answers
  • Draw a dfd that shows how data will be stored, processed, and transformed in the tims system
    9·1 answer
  • customer seeks to buy a new computer for private use at home. The customer primarily needs the computer to use the Microsoft Pow
    5·1 answer
  • What are your thoughts on copyright?<br><br> (Write 2 or more sentences)
    9·2 answers
  • Interest on loan paid to sangam stores Rs5000(journal entry)​
    13·1 answer
  • dash is a set of communication standard using for transferring file information between computers in a network​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!