1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kifflom [539]
3 years ago
11

Here is free points im leaving

Computers and Technology
2 answers:
Anna [14]3 years ago
5 0

<em>Hello Buddy!</em>

<em>Why are you leaving buddy?</em>

<em>Do u need a hug buddy?</em>

<em>(づ ̄ . ̄)づ</em>

<em>Have a nice trip! ^^</em>

Advocard [28]3 years ago
4 0

Answer:thanks

Explanation:thanks

You might be interested in
What determines whether you can run two programs at the same time or connect your computer to a network?
GuDViN [60]
How your computer is built. Processor... Wireless card.... network card... ethernet ports...
4 0
4 years ago
Consider this function comment. Which of the following options is recommended in your textbook? Computes the area of a cuboid. e
Tamiku [17]

Answer:

A. The comments are adequate to describe the function.

Explanation:

C++ programming language comments starts with two forward-slash ("//") and can be written above a code statement or at the right-hand side of the code statements

The comments of the area() function with three parameters width, height, and length are adequate to describe the function as it does not need to end with a semi-colon.

8 0
3 years ago
A majority of the people whose information was compromised are homeless; therefore there is no easy way to contact them in order
Novosadov [1.4K]

Incomplete question. Here's the full question:

Data-Time Inc. is a company that manages databases for a large city in Colorado. Included in these databases is information collected from the city’s homeless shelters and free clinics. Specifically, the databases contain personal information of the users of these services over the past 10 years; this includes people’s Social Security numbers and health records.

This data is highly secure and only accessible to the employees of Data-Time Inc. Employees are given a laptop when they are hired which allows them to access the database remotely. Unfortunately, one of these laptops is stolen and the security of the database is compromised.

A majority of the people whose information was compromised are homeless; therefore there is no easy way to contact them in order to alert them of the security breach. How should Data-Time Inc. manage this breach in security?

<u>Explanation:</u>

Since the emphasis is not on reversing the breach that has occurred, but on managing the level of security damage that could occur, it is important measures are directed towards preventing unauthorized access to sensitive information.

For example, the Media Access Control Address (MAC address) of the laptop if known could be greylisted from accessing the server that contains the sensitive information.

3 0
3 years ago
Philip is thinking about customizing his motorcycle. A paint job, saddlebags, and a radio would cost $600. His motorcycle is old
Vikki [24]

Answer:

He will temporarily have less money in his bank account is the correct answer.

Explanation:

Philip is considering customizing his motorcycle. A saddlebags, a paint job, and a radio will cost $600. His motorcycle is vintage, so he already realized maybe sometime in the past two years he would required to get any other bike. To analyze the options, he builds a cost-benefit analysis table. He considers this, he might have less funds at that moment in his banking account.

7 0
4 years ago
If C2=20 and D2=10 what is the result of the function = mathcal I F(C2=D2,^ prime prime Ful "Open")?
Leya [2.2K]

Excel IF functions are used to test conditions.

The result of the IF function is (a) Open

The function is given as: <em>= IF(C2 = D2, "Full","Open")</em>

Where: C2 = 20 and D2= 10

The syntax of an Excel IF conditional statement is: <em>= IF (Condition, value_if_true, value_if_false)</em>

The condition is: <em>IF C2 = D2</em>

The values of C2 and D2 are: 20 and 10, respectively.

This means that, 20 does not equal 10.

So, the value_if_false will be the result of the condition.

In other words, the result of the IF function is <em>(a) Open</em>

<em />

<em />

Read more about Excel functions at:

brainly.com/question/10307135

7 0
3 years ago
Other questions:
  • When formatting documents, ____ settings determine where text begins on a line in relation to the left margin?
    8·1 answer
  • Sukhi needs to insert a container into her form to collect a particular type of information. Which object should she insert?
    6·1 answer
  • What wireless channel should I use?
    10·2 answers
  • On the 80x86 CPU, the ESP register keeps track of the value on the top of the runtime stack.
    11·1 answer
  • You have heard that it is possible to improve your computer's performance by storing all related files for a particular program
    9·1 answer
  • Why would a network administrator want to filter certain ports when capturing data such as FTP traffic
    6·1 answer
  • PLS HELP
    5·1 answer
  • Brooke is trying to save enough money in the next fifteen months to purchase a plane ticket to Australia. Every month Brooke sav
    10·1 answer
  • Input an int between 0 and 100 and print the numbers between it and 100, including the number itself and the number 100. If the
    5·1 answer
  • What is the purpose of flight simulator programs, and what are some of the benefits of using them?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!