1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bija089 [108]
3 years ago
5

What two variables does mass depend on?

Computers and Technology
1 answer:
Ber [7]3 years ago
4 0

Answer:       The answer to your question would be A

have a good day

Explanation:

You might be interested in
Write a function called printBackwards() that will work with a C string. The function will print any C string backwards. You don
yaroslaw [1]

Answer:

void printBackwards(char s[])

{

   int n=strlen(s)-1;//finding the last index of the string..

   for(int i=n;i>=0;i--)//loop to print the string backwards..

   {

       printf("%c",s[i]);//printing the character of the string..

   }

}

Output:-

abcdefg

gfedcba

Explanation:

I have used strlen function that will be used after including the string.h header file.It returns the length of the string.After finding the last index I have iterated over the c string in reverse order and printing the character of the string one by one.

8 0
3 years ago
50 Points! 25 Points Each! Please help ASAP! Will mark brainliest! See attached image.
monitta

Answer:

I can't see the image

Explanation:

please put image up there

6 0
3 years ago
Read 2 more answers
A __________ infrastructure is made available to the general public or a large industrygroup and is owned by an organization sel
Amiraneli [1.4K]

\Huge{\fbox{\red{Answer:}}}

A <u>public cloud</u> infrastructure is made available to the general public or a large industrygroup and is owned by an organization selling cloud services.

a. community cloud

b. hybrid cloud

c. public cloud ✔

d. private cloud

5 0
3 years ago
What is a limitation of the flash memory card select one of the options below as your answer:
Inga [223]
The answer is C. You can only use it with the correct memory card reader.
4 0
3 years ago
which of the following present the most significant obstacle to developing IT security if we consider commerce and marketing?
Dmitry_Shevchenko [17]

Answer:

There is no direct return on investment in building security systems.

Security systems are detrimental to usability and can make IT systems less functional, and therefore less attractive to the customer.

There is pressure to reduce the time it takes to get a new IT product or system onto the market, so security systems are sacrificed in order to reduce the time-to-market.

Explanation:

Cyber security has always been challenging for the organizations. There have been groups which are always looking for loop holes in cyber security and hacks the details and asks the ransom to restore. IT systems have now been more complex in this era. Users are increasing every new day and network accounts security is more demanding. Computer connection are more complex and require special attention to control them. The obstacles in IT systems are of concern as there is need for dynamic IT solution to counter the challenging hackers.  New programs and customized demand of IT systems need customized IT security systems.

4 0
3 years ago
Other questions:
  • The numbers on the bottom of a typical check represent all of the following EXCEPT?
    12·2 answers
  • The rod and crankshaft convert the up-and-down motion of the piston into
    12·2 answers
  • After configuring a static IP address on a desktop computer, the technician finds that he cannot communicate with other devices
    10·1 answer
  • Write a complete program to read two integers and display the number of integers that lie between them, including the integers t
    12·1 answer
  • 1.Characters archetypes are typical characters that represent universal patterns of human or human roles. (True or false)
    14·1 answer
  • Computers heat resistant materials breathing systems for fire fighters food-growing technologies improvements in all of the item
    14·1 answer
  • What is the process of copying items from ram to a storage device?
    8·1 answer
  • Political parties to address the interest of civil society<br>​
    7·1 answer
  • Each instruction that the CPU receives contains two parts -
    12·1 answer
  • What is a document you can create with word-processing software
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!