1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ioda
3 years ago
14

Assume you previously entered these lines of code.

Computers and Technology
2 answers:
antiseptic1488 [7]3 years ago
8 0

Answer:

result = ab + bc and result = a * b - b

Explanation:

That is what the test told me

Stella [2.4K]3 years ago
6 0

Answer:

The correct answer is result = a * b - b / c <em>and</em> result = ab + bc <u><em>or</em></u><em> </em>A <em>and </em>D.

Explanation:

I just took the quiz and got it correct.

You might be interested in
Look at the data set below. {9, 12, 12, 15, 18, 20, 25} in this data set, what is the median
cluponka [151]

. Answer: Median: 15

8 0
3 years ago
Read 2 more answers
2 what is deep learning?
lozanna [386]

Answer:

a type of machine learning based on artificial neural networks in which multiple layers of processing are used to extract progressively higher level features from data.

5 0
1 year ago
Members of the sales team use laptops to connect to the company network. While traveling, they connect their laptops to the inte
coldgirl [10]

Answer: Network access control (NAC)

Explanation:

The solution that should be used is the network access control. Network access control helps in keeping devices and users that are unauthorized out of ones private network.

In this case, since one will like to prevent the laptops from connecting to the network unless anti-virus software and the latest operating system patches are installed, then the network access control can be used. One can only give access to the device that it wants to give access to and prevent others from connecting.

3 0
2 years ago
What is the difference, if any, between secure HTTP and firewalls?
Jobisdone [24]

Answer:

SSL would simply encrypt whatever request is sent to the server. In order to prevent the execution of such malicious scripts/payloads at the Web application (in other words the Web server), a Web Application Firewall is implemented in place. ... Whereas, HTTPS where SSL comes into picture would have methods such as POST.

in other words its A

5 0
3 years ago
The following SQL statement contains which type of subquery? SELECT title FROM books WHERE EXISTS (SELECT isbn FROM orderitems W
Rudiy27

Answer:

(a) Correlated.

Explanation:

Correlated subquery :These sub queries reference columns from outer table or uses values from outer query.These sub queries are processed atleast once for every row processed.So because of this reason correlated sub queries can be slow.Since the query in the question also uses value from the outer query so it is a correlated query.

4 0
3 years ago
Other questions:
  • Software license infringement is also often called software __________.
    11·2 answers
  • A block style business letter is:
    5·1 answer
  • Which audio editing effect uses the option ""Get Profile"" to execute its function?
    6·1 answer
  • A(n) ________ moves over the spinning platters to retrieve data from the hard disk.
    6·1 answer
  • Define<br>output<br>devices<br>.<br>Give<br>any<br>three<br>examples<br>.<br>3.​
    8·2 answers
  • How are satellite radio, Internet radio, and podcasting different?
    11·1 answer
  • • Comments are blank which can be blank entered into documents
    5·1 answer
  • Computing devices translate digital to analog information in order to process the information
    12·1 answer
  • Brainly not working for me not showing any ads or answers
    5·2 answers
  • Complete the following sentence. <br> _______ is often used to solve riddles and puzzles.
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!