1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mashutka [201]
3 years ago
8

Write a algorithm to attend birthday party​

Computers and Technology
2 answers:
kolezko [41]3 years ago
8 0

Answer:

2     No

5 14    Yes

Explanation:

topjm [15]3 years ago
6 0
Hdbdhfhfbfbfbfbfbfbfbfbfbfbfbf
You might be interested in
Assignment Guidelines
kompoz [17]

Answer:

Explanation:

so u have to be smart

5 0
3 years ago
What are the basic problem that my pc can have?
Lena [83]
A virus, malware, unplugged, used too much storage, etc.
5 0
3 years ago
Tips to identify email scams.
malfutka [58]

Answer:

Explanation:

dont open or sign up to anything that seems to good to be true

7 0
3 years ago
Cindy wants to send threat information via a standardized protocol specifically designed to exchange cyber threat information. W
Dahasolnce [82]

Cindy  can choose to exchange cyber threat information in the given scenario via the use of TAXII.

<h3>What is standardized protocol?</h3>

Standardized protocols is known to be the one that gives room for people or clients to communicate with any given window manager.

Note that in the above case, Cindy  can choose to exchange cyber threat information in the given scenario via the use of TAXII.

Learn more about standardized protocol from

brainly.com/question/14672166

#SPJ1

8 0
2 years ago
Knowledge management software helps companies preserve the knowledge gained through the use of information so that future users
V125BC [204]

Answer:True

Explanation:

Knowledge Management (KM) software is software that assists with the identification, creation, distribution, and organization of a company’s knowledge pool. KM software, at its best, gives a company a single, unified pool of information that is easily

(1) accessible

(2) discoverable

(3) updated

KM software is meant to make companies leaner, efficient, and more profitable. But a number of challenges exist which make that easier said than done. Let’s look at a few of the primary challenges that make KM software so important for businesses—but so difficult to get right.

8 0
3 years ago
Read 2 more answers
Other questions:
  • Lydia used software to calculate the budget for each department. To create this budget, she used a _____.
    7·2 answers
  • List and describe two of the four generally recognized security positions.
    6·1 answer
  • The faster data transfer port for computer today is port
    6·1 answer
  • Select the correct answer from each drop-down menu.
    8·1 answer
  • Which of the following is not a method of data management?
    15·1 answer
  • What is the difference between a Network Diagram and a Wiring Semantic?
    5·1 answer
  • If you were infiltrating a network (10.16.0.0/16), and searching for vulnerabilities (while trying to remain undetected), why wo
    11·2 answers
  • How do i do a mutioutput on a mac
    9·1 answer
  • When performing the ipconfig command, what does the following output line depict if found in the tunnel adapter settings?
    5·1 answer
  • Which method adds 10 to the right end of the array?<br> myArray.<br> insert<br> (10)
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!