1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pshichka [43]
4 years ago
11

How to study program ?

Computers and Technology
1 answer:
CaHeK987 [17]4 years ago
6 0
I don’t understand how this question can u explains more or be a little more specific please.
You might be interested in
Which component in a laser printer applies toner to the drum?
Snowcat [4.5K]

the Developing roller applies the toner

6 0
3 years ago
Write the definitions for three functions named max. Each receives two parameters, of the same type, and returns the larger of t
AnnZ [28]

Answer:

public double max(double m, double n)

{

if (m>=n)

return m;

else

return n;

}

public int max(int m, int n)

{

if (m>=n)

return m;

else

return n;

}

public char max(char m, char n)

{

if (m>=n)

return m;

else

return n;

}

Explanation:

In each of the three methods declarations (Java) above, we are comparing two variables. m and n. The question did not specify what should happen when both variables are the same (i.e. m = =n). We make an assumption and set the condition to be if(m>=n) m should be returned as the greater.

5 0
3 years ago
. The total processing speed of microprocessors (based on clock rate and number of circuits) is doubling roughly every year. Tod
horsena [70]

Answer:

130 bits

Explanation:

If the length of a key = N bits

Total number of key combinations = \frac{2^{N} }{2}

For a key length of 100, the total number of key combinations will be  \frac{2^{100} }{2} = 2^{99} combinations. This is a whole lot and it almost seems impossible to be hacked.

The addition of  one bit to the length of the symmetric key in 1 year is sufficient to make the key strong, because even at double its speed, the processor can still not crack the number of combinations that will be formed.

Therefore, if a bit is added to the key length per year, after 30 years, the length of the symmetric session key will be 130 bits.

8 0
3 years ago
You are engaged in affinity analysis. what does this mean?
nataly862011 [7]

Answer:

The answer is d.seaching for pattern matches.

Explanation:

Affinity analysis is a technique of data analysis and data mining used to discover relationships among activities performed by a group of interest. It's applied to process where the group of interest records information of their activities and that can be identified. In other words, this technique is used to analyze the behavior of people to identify patterns to determine links into potential purchases.

3 0
3 years ago
Question 1
weeeeeb [17]

Answer:

-6.4

Explanation:

just divide -32 by 5 and you will get your answer of -6.4

7 0
3 years ago
Other questions:
  • When does a kernel panic occur?
    12·2 answers
  • A manager in your company wants to standardize all mobile device applications across different operating systems. Some users hav
    10·1 answer
  • When there is flooding and you see pooled water, what should you do?
    13·1 answer
  • Under what driving conditions will 2019 Nissan LEAF’s available Rear Cross Traffic Alert (RCTA) warn the driver if a vehicle is
    11·1 answer
  • How are some businesses capitalizing on social media at the time of someones death
    7·1 answer
  • In the system of stream orders, the smallest unit in the network comprised of both the most numerous type, and the shortest leng
    7·1 answer
  • What’s my password for this app
    6·2 answers
  • Would a sim card(activated) be able to function on any phone regardless of the companies carrier?
    7·1 answer
  • A 16 x 2 audio console has (A) 16 inputs and 2 outputs (B) 16 slide faders and 2 monitor systems (C) 16 VU meter
    5·2 answers
  • Which terms would be found in search for "Mo*”? Check all that apply.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!