1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
White raven [17]
3 years ago
9

A Windows application which demands a lot of raw processing power to execute repetitive complex calculations is a good candidate

for the object-oriented programming language C/C++.
A. True
B. False
Computers and Technology
1 answer:
Rama09 [41]3 years ago
5 0

Answer:

The answer is "option A".

Explanation:

The description of this question as follows:

  • The Windows system, also known as the ' Windows app. ' and all Windows 32-bit applications run on 32-bit and 64-bit versions of Windows. The whole squeal is free to run the Windows program.
  • The 64-bit Windows applications are the standard for new computers and tablets in Windows, which is written in C/C++ language.
You might be interested in
Dawn needs to insert a macro into a Word document. Where can she find the Insert Macro dialog box?
amid [387]

Answer:

Developer tab

Explanation:

Inserting the Macro dialog box can be confusing for many people because the "Developer tab," where it can be found, is <em>hidden by default</em> in Microsoft Word. In order to add this to the ribbon, all you have to do is to go to the File tab, then click Options. After this, click Customize Ribbon. Under this, choose Main Tabs, then select the Developer check box. The Developer tab will then become visible. You may now insert a macro.

6 0
3 years ago
What are experts in technology who use their knowledge to break into computers and networks, for profit or just as a challenge k
insens350 [35]

Answer:

Hacker

Explanation:

Hacker -

It refers to the computer software expert , who is responsible to break into the unauthorized networks or computer , is referred to as a hacker .

The hacker is skilled with exceptional computer and computer software knowledge .

Hacking is an illegal practice , as the person is able to access some confidential and personal data and information of any other person or organisation .

Hence , from the given information of the question ,

The correct term is hacker .

3 0
4 years ago
What is a user data?
Rom4ik [11]

Answer:   Any data the user creates or owns.

Explanation:

the user being the one on the otherside of the computer, usually a human.

but examples of user data are intalled programs, uploads, word documents created by user (computer user)

7 0
3 years ago
Answer ASAP and I'll give brainliest, thanks, and five stars!
Goshia [24]

Answer:

The students who buy lunch are not getting enough time to socialize/ eat lunch because they spent it standing in line

Explanation:

That would be my guess, hope this helps

8 0
3 years ago
Read 2 more answers
In brainly.com which is best answerer​
mote1985 [20]

Explanation:

I don't know, because I had only spent one month in brainly. but I think it is Mister 360. s/he is a great answerer and always stay at top in leaderboard.

5 0
3 years ago
Other questions:
  • Into which of these files would you paste copied information to create an integrated document? A. Mailing list B. Source C. Data
    13·2 answers
  • To erase an entire entry in an excel cell and then reenter the data from the beginning, press the ____ key.
    5·1 answer
  • A palindrome number is a number that remains the same when its digits are reversed. Like 16461, for example, is a palindrome num
    13·1 answer
  • Who can provide you with a new password when you have forgotten your old one?
    14·2 answers
  • Type the correct answer in the box. Spell all words correctly.
    7·1 answer
  • Write the definition of a function named fscopy. This function can be safely passed two fstream objects, one opened for reading,
    11·1 answer
  • What are several networks connected together using a router
    10·1 answer
  • You are reviewing the output of the show interfaces command for the Gi0/1 interface on a switch. You notice a significant number
    12·1 answer
  • The User Datagram Protocol (UDP) is called the connectionless protocol because: It does not attempt to fix bad packets but resen
    8·1 answer
  • Can anyone help my please
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!