1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Komok [63]
4 years ago
10

Compare the applications below:

Computers and Technology
2 answers:
Lubov Fominskaja [6]4 years ago
6 0

Answer:

i think it is B

Explanation:

Anna11 [10]4 years ago
6 0

Answer:

Its B

Explanation:

Duolingo is for learning a new language while Candy Crush is a game for a mobile device or pc

You might be interested in
What is a leased line​
scoundrel [369]

Explanation:

A leased line is a dedicated fixed bandwidth data connection. The word leased refers to the connection rented by the internet service provider directly to a business. A leased line needs to be symmetrical, uncontended and point to point

3 0
3 years ago
Read 2 more answers
What is the difference between a Computer Science and a Compter Engineer major?
xeze [42]

Answer:

Computer Science is the study of the existing things and programming language to acquire knowledge in that field

Computer engineering is applying the knowledge to invent new things

Explanation:

Computer Science is the study of the existing things and programming language to acquire knowledge in that field

Computer engineering is applying the knowledge to invent new things

If we want to accomplish any task , first you should know how to achieve that task and you should have some knowledge to do that task. Computer Science basically deals with acquiring knowledge in the are of computers.

Computer engineering is the engineering things based on the facts we have alreday

5 0
4 years ago
Five uses of the start button
Damm [24]

Starting something

Possibly turning it off

Making something work

Fixing the Start Button

Beginning something

5 0
3 years ago
Cyber vulnerabilities to dod systems may include
Ivan

Cyber vulnerabilities to dod systems may include all of the above Options.

<h3>What is Cyber vulnerabilities?</h3>

In cybersecurity, a vulnerability is known to be any kind of weakness  exist with the aim to be exploited by cybercriminals to be able to have unauthorized access to a computer system.

Note that in the case above, Cyber vulnerabilities to dod systems may include All of the above Options.

Learn more about cyber vulnerabilities from

brainly.com/question/7065536

#SPJ11

6 0
2 years ago
File Letter Counter
Zanzabum

Answer:

The solution code is written in Python.

  1. fileName = input("Enter file name: ")
  2. target = input("Enter target character: ")
  3. with open(fileName, "r")as reader:
  4.    content = reader.read()
  5.    print(content.count(target))

Explanation:

Firstly, use <em>input() </em>function to prompt user for a file name. (Line 1)

Next, we use input() function again to prompt user input a target character (Line 2)

Create a reader object and user <em>read() </em>method to copy entire texts from to the variable<em> content </em>(Line 4 - 5).

At last we can get the number of times the specified character appears in the file using the Python string built-in method <em>count() </em>(Line 6)

5 0
4 years ago
Other questions:
  • What is an incremental backup?
    7·1 answer
  • Can somebody help me with this problem
    10·1 answer
  • "The process was placed in a suspended state by an agent; either itself, a parent process, or the OS, for the purpose of prevent
    10·1 answer
  • The transmission method that sends data to every device on a lan is known as a _____ transmission.
    8·2 answers
  • Which one of the following analog VOM ranges would be selected to measure a DC
    13·1 answer
  • The easiest way to run a web page that’s already in your browser after you’ve made changes to the code for the page is to
    6·1 answer
  • Finish the code where it says //YOUR CODE HERE
    11·1 answer
  • What is the purpose of exploring data?
    6·2 answers
  • Give five example of secondary storage device, stating their function and storage capacity​
    6·1 answer
  • What action should you take if you become aware that sensitive compartmented information has been compromised
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!