1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mashutka [201]
3 years ago
8

Write a algorithm to attend birthday party​

Computers and Technology
2 answers:
kolezko [41]3 years ago
8 0

Answer:

2     No

5 14    Yes

Explanation:

topjm [15]3 years ago
6 0
Hdbdhfhfbfbfbfbfbfbfbfbfbfbfbf
You might be interested in
You manage a server that users store their document files on. you are finding that some users are utilizing more space than they
STALIN [3.7K]
You can set soft or hard quotas on file shares per user or per group. This would limit how much space a user can take up.
5 0
3 years ago
A newspaper publishes a negative editorial on how local politicians are dragging their feet in building a new bridge. Select the
jeka57 [31]
Your answer would be
A. The editorial is data.
I just took this test :)
6 0
3 years ago
Read 2 more answers
question 2 what are some types of software that you'd want to have an explicit application policy for? check all that apply.
zaharov [31]

The types of software that you'd want to have an explicit application policy are:

  • Filesharing software
  • video games

  • Explicit application policy are simply refered to as legal rights that are stated regarding ownership or company. It is actual substance of an agreement

  • Video games and filesharing software is of not really important in som business. So therefore, having explicit policies showing why or not this type of software is permitted on systems is okay.

Conclusively, we can say that Filesharing software and video games can require an explicit application policy.

Learn more from

brainly.com/question/12730075

4 0
3 years ago
HELP ME PLEASE!!!!!!!!!!!!
Mila [183]

Answer:

b b isss the right answer

5 0
3 years ago
Read 2 more answers
Rony works on several confidential files for his company. Ignoring the privacy requirements, Rony places the files in a shared f
kumpel [21]

Answer:

D. ​He should designate all the files in the shared folder as read-only.

Explanation:

The steps Rony should take while using a peer-to-peer (P2P) network to prevent his original files from being overwritten by another P2P user is that He will make the file as read-only.

In making the file read-only, other users who have access to the shared folder can only read the file without modifying it's content.

By default, he is already the owner of the file, so option B is not the correct answer.

Also making the file executable give other users higher privilege, so option A is also not correct.

8 0
3 years ago
Other questions:
  • NOTE: in mathematics, division by zero is undefined. So, in C , division by zero is always an error. Given a int variable named
    10·1 answer
  • A USB zipper drive is a small data storage device that plugs into a computer's USB port.
    14·1 answer
  • Which function would you use to make sure all names are prepared for a mailing label?
    10·2 answers
  • Your IT manager wants you to set up three computers to appear to users as one powerful Windows Server 2016 server. What capabili
    14·1 answer
  • An acronym is a word formed by taking the first letters of the words in a phrase and making a word from them. For example, AGH i
    10·1 answer
  • when files on storage are scattered throughout different disks or different parts of a disk, what is it called
    10·1 answer
  • Which of the following is a system management tool?
    9·2 answers
  • PLS HURRY<br> Look at the image below
    8·1 answer
  • Why is the yellow light blinking on the front of my computer
    10·1 answer
  • Each high-level language has its own __________, or rules of the language. group of answer choices
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!