1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anastasy [175]
3 years ago
5

bad word bad word bad word bad wordbad word bad wordbad word bad wordbad word bad wordbad word bad wordbad word bad wordbad word

bad wordbad word bad wordbad word bad wordbad word bad wordbad word bad wordbad word bad wordbad word bad wordbad word bad wordbad word bad wordbad word bad wordbad word bad wordbad word bad wordbad word bad wordbad word bad wordbad word bad wordbad word bad word
Computers and Technology
1 answer:
topjm [15]3 years ago
7 0

Answer:

men badwordbadword badwor

You might be interested in
The source Host A is going to send 5KB (5120byte) of data to the destination Host B over an established TCP connection, which ha
NISA [10]

Answer:

the answer is d have a nice day

Explanation: i got a 100

3 0
2 years ago
QUICK PLZZZZZZZ Which one of the following is considered a peripheral? A Software B Mouse C USB connector D Motherboard
il63 [147K]

A MOUSE is considered a peripheral. A peripheral device connects to a computer system to add functionality.

6 0
3 years ago
What is the answer to 7.4.4: Length of User's Name codehs
Alik [6]

The program that ask the user to type there first name and then print out how many letters that is in there name is as follows:

x = input("what is your first name: ")

y = len(x)

print(f"There are {y} letters in your name")

<h3>Code explanation;</h3>

The code is written in python.

  • Firstly, we store the users name in the variable x.
  • Then, we find the length of the users inputted name and store it in a variable y.
  • Finally, we print the length of the users name using the print function.

learn more on python here: brainly.com/question/26738945

4 0
2 years ago
Raul converts numbers in base 10 to base 2. Which answer best defends why Raul would need to do this?
gtnhenbr [62]

Answer:

C

Explanation:

All the calculation by computer is performed in base 2. Base 2 is also named as binary computation and it is used in all the computer and digital data processing processors.

Some differences between base 2 and base 10 are:

  • Base 2 number system contains 0 and 1 whereas base 10 is from 0 to 9.
  • Digital systems works on 0 and 1 logic i.e on and off logic. So we use digital system easily in binary domain whereas, decimal system has 0-9 levels and they are hard to be catered in digital domain.
  • Base 10 is used in normal calculations for daily use and binary is only confined to digital domain.
7 0
3 years ago
Explain why cloud computing can be more complex than a traditional approach.
sp2606 [1]

Cloud computing is more complex than traditional approach due to the following reasons.

Explanation:

1.Cost Savings and Total Cost of Ownership. When you move to cloud computing you tend to save money in several ways in comparison to traditional IT, including the reduction of in-house equipment and infrastructure.

2.Dissatisfaction in Traditional IT. Many companies are frustrated with the negatives that come with traditional IT, such as poor data backup, managing and maintaining your own hardware, and lack of disaster recovery options.

3.Time to Value and Ease of Implementation. Since you don’t have to spend time configuring hardware, maintain systems, and patching software, you can invest your resources elsewhere.

4.Access to Emerging Technology. Much like a car, the minute you purchase on-premise hardware and software, it immediately starts to age. You can access the latest and greatest innovations with a cloud provider who has more purchasing power and stays up-to-date with available solutions. Also, as new innovations are released, they become less likely to integrate with legacy solutions that are often inflexible. Instead, cloud-first development is coming to the forefront.

5.Using Hybrid to Optimize your Operations. Some organizations take the use of the cloud even further by using multiple clouds simultaneously, thus giving them even more agility. Workloads are placed where they perform best, and where costs are most efficient.

5 0
3 years ago
Other questions:
  • A plan that outlines the steps and timeline for reaching a certain goal is called a(n):
    13·1 answer
  • What is the function of the keyboard shortcut Ctrl+Shift+E in a word processor
    5·2 answers
  • What component has the job of managing data as it flows into and out of the places it needs to go?
    11·2 answers
  • How would you delete a slide from your presentation after selecting it?
    12·1 answer
  • You accidentally find someone's password and use it to get into a system. this is hacking.
    15·1 answer
  • What document type would be best to communicate sales items from a business to potential customer?
    12·1 answer
  • Write an application that determines the value of the coins in a jar and prints the total in dollars and cents. Read integer val
    6·2 answers
  • What is said to be the first mechanical calculator​
    7·2 answers
  • 8
    7·1 answer
  • How serious are the risks to your computer security?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!