1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Murljashka [212]
3 years ago
13

A(n) __________ is a common list operation used in programming. its purpose is to iterate through a list of items, one item at a

time, and check each one to see if it has exactly what we are looking for.
a. list search
b. establishment
c. priority list
d. neighbor comparison
Computers and Technology
1 answer:
Nataliya [291]3 years ago
5 0
I would say C- Priority List.
I hope this helps! :)
You might be interested in
Which one of these do you need to become president of the US ?
gladu [14]

Answer:

Tbh i dont even know

Explanation:

I had who i wanted to become president but i don't even know anymore

7 0
2 years ago
Read 2 more answers
Two types of are desktop computers and notebook computer
aalyn [17]

Explanation:

A. personal computer

wait others answer for sure

4 0
3 years ago
Read 2 more answers
I wiil mark brainlist ​
Darina [25.2K]
CAD is the answer you require, but it may also be Spread sheet

Hope this helped ♥︎
5 0
3 years ago
Liam noticed someone had accessed his social media account and made several posts without his knowledge. Which of the following
jok3333 [9.3K]

Answer:

Liam could

1) Change the password

Be sure to change the password to a "strong" one (containing lots of characters, numbers, symbols) so that way the password would be difficult to guess.

2) Avoid logging onto social media on public computers or WiFi connections.

Using public WiFi leaves you vulnerable to someone accessing your information through Internet traffic. If you do use public computers, just make sure to log out.

3) Avoid giving out account information to friends and avoid opening suspicious links and emails.

Opening suspicious links or emails could allow malware to infect your computer the moment you open them. Friends can unknowingly share these links that are designed to steal information.

I hope this helped <3 please lmk if there's anything more to add.

4 0
3 years ago
Which statements best describe slaves in ancient times? Select all that apply.
Romashka-Z-Leto [24]

Answer:

Slaves are the people thought as conquered People

Explanation:

In ancient times, slaves works without any remunerations. These people are captured or purchased by rich peoples. Their whole life spends in slavery. The people who are also prisoners of wars worked as slaves for their rest of the life.

5 0
3 years ago
Other questions:
  • Proxy data:
    12·1 answer
  • Why is there a need to compare and align one's PECs of a successful entrepreneur?
    5·1 answer
  • 0001 0000 1100 0011 (unsigned, that is, interpreted as b2u)i.8 bit truncated value:ii.does the value change when truncated to 8
    7·1 answer
  • I WILL GIVE BRAINLIEST TO WHO ANSWERS FIRST AND CORRECTLY.
    9·1 answer
  • Carrie is creating a personal balance sheet. The heading includes the period of time that the balance sheet
    11·1 answer
  • What Fortnite skin is more og?
    5·2 answers
  • Write Java code that creates an array of n integers myArray, by taking n integers from the user with duplications, and do the fo
    8·1 answer
  • What is the name of the option in most presentation applications with which you can modify slide elements?
    7·2 answers
  • These 2 questions PLEASEEE (:
    14·1 answer
  • I ate five M&amp;Ms: red, green, green, red and yellow. Only these three colors are possible. I assume that p(yellow)=3p(green)
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!