1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MA_775_DIABLO [31]
3 years ago
6

Can someone help me with the 2.4 code practice question 2 on Edhesive???

Computers and Technology
1 answer:
Law Incorporation [45]3 years ago
5 0

Answer:

sure, just show me the problem

You might be interested in
Convert each of the following for loops into an equivalent while loop. (You might need to rename some variables for the code to
MAVERICK [17]

Answer:

~CaptnCoderYankee

Don't forget to award brainlyest if I got it right!

Download txt
5 0
3 years ago
The ____ tool allows a user to connect to the active registry database and make changes that are effective immediately. editreg.
kenny6666 [7]
Regedit is the Answer
3 0
3 years ago
Which access control principle limits a user's access to the specific information required to perform the currently assigned tas
Svetradugi [14.3K]

Answer:

The answer is "Need-To-Know Access Control Principle"

Explanation:

There are three types of access control methods such as Role-Based Access Control, Discretionary Access Control and Mandatory Access Control.

The access control principle that limits/blocks the user from gaining access to a folder/information/procedure within the system is called "Need-To-Know Access Control Principle".

I hope this answer helps.

4 0
3 years ago
You plug a new scanner into a USB port on your Windows system. When you first turn on the scanner, what should you expect to see
Paul [167]

Answer:

A window notifying that: Found New Hardware Wizard

Explanation:

As soon as any device is plugged into the USB port, the default settings will display a window onto the screen which will notify about the addition of a new hardware to the system. This window can further be used to know the properties of the hardware or for configuration settings.

This process is same like the software part, that whenever a new application is installed onto the system a pop up notification alerts about its presence.

So when the scanner will be attached through USB port a window will be appeared notifying about the discovery of new hardware.

3 0
3 years ago
Margaret would like to work in the Journalism and Broadcasting industry. Which set of qualifications would best assist Margaret
8_murik_8 [283]
Critical thinking, accuracy and confidence
7 0
3 years ago
Read 2 more answers
Other questions:
  • ________ is a dedicated device designed to manage encrypted connections established over an untrusted network such as the Intern
    12·1 answer
  • Consider an unpipelined or single-stage processor design like the one discussed in slide 6 of lecture 17. At the start of a cycl
    10·1 answer
  • . Two blue armies are each poised on opposite hills preparing to attack a single red army in the valley. The red army can defeat
    5·1 answer
  • Which of the following cameras is a high-end digital camera that has interchangeable lenses and uses a mirror to display on its
    13·1 answer
  • What do mobile platforms utilize to stream voice, IP telephony, mobile internet access, video calling, gaming services, cloud co
    15·1 answer
  • Can somebody do an Algorithm 2 for more?<br> (Python)
    15·1 answer
  • Directions and Analysis
    15·1 answer
  • For this step, submit your work in the programming environment by
    12·1 answer
  • A company is looking for an employee to assign passwords to all of its
    5·1 answer
  • What is the difference between
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!