1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
posledela
3 years ago
13

Ben pays his mobile bills, watches movies, and shops online using the Internet. Which internet activity does he perform?

Computers and Technology
2 answers:
Genrish500 [490]3 years ago
7 0

Answer:

all three

Explanation:

Mumz [18]3 years ago
4 0

Answer:

ALL

Explanation:

You might be interested in
You have to calculate the total amount you spent at the mall today. Which function should you use to do so?
rosijanka [135]
If it has to be exactly then C-sum
3 0
3 years ago
Read 2 more answers
This type of method method performs a task and sends a value back to the code that called it:
Thepotemich [5.8K]

Answer:

Option 4: Value-returning

Explanation:

In programming, a method is a named section of codes that perform a specific task. This is possible to define a method that return a value after performing its task. This type of method is known as Value-returning method.

For example, we can define a method addition that takes two inputs, x, y and return the summation of x + y to the code that called it. The codes are as follows:

  1.    public static void main(String[] args) {
  2.        int sum = addition(3, 5);
  3.    }
  4.    
  5.    public static int addition(int x, int y){
  6.        return x + y;
  7.    }

6 0
3 years ago
Is a process in which an attacker attempts to acquire information about your network and system by social means, such as talking
aleksandr82 [10.1K]
The answer would be software exploitation
4 0
3 years ago
The IT department sent out a memo stating that it will start delivering desktop computer interfaces through the IT data center v
Tasya [4]

Answer: Virtual desktop infrastructure

Explanation:

The virtual desktop infrastructure is the virtualization technology in which the host desktop OS (operating system)  is in the centralized server of the data center. The virtual desktop infrastructure is also known as server based computing as it include the variation in the computing model such as client - server model.

The example of the virtual desktop infrastructure is wallpapers, toolbars, window and folder is the stored in the server remotely.

All the other options does not involve with this technology so that is why option (D) is correct.

4 0
3 years ago
C++
Luden [163]

Answer:

The program to this question as follows:

Program:

//header file iostream

#include<iostream> //including file for use basic function

//using name space

using namespace std;

//main method

int main() //defining main method

{

   int a[3][3]; //defining two dimension array

   int x,y,sum=0; //defining variables

   cout<<"Enter array elements: "<<endl; //message

   for(x=0;x<3;x++) // for row

   {

       for(y=0;y<3;y++) //for column

       {

          cin>>a[x][y]; //input values from user.

       }

       

   }

   //loop for calculting sum.

   for(x=0;x<3;x++)

   {

       for(y=0;y<3;y++)

       {

       sum=sum+a[x][y];//add all elements

       }

       

   }

   cout<<"Sum: "<<sum; //print sum.

   return 0;

}

Output:

Enter array elements:  

1

2

3

4

5

6

7

8

9

Sum: 45

Explanation:

In the above C++ programming language code first, a header file is included then the main method is declared, inside a main method 2D array that is "a[][]", and an integer variable is defined that are "i, j, and sum". In the next line for loop is used, this loop is used two times that can be described as follows:

  • The first time it is used for inserting elements from user ends.  
  • The second time, it uses the sum variable to add all array elements. and in the last print function that is "cout" is used for print sum variable value.
7 0
3 years ago
Other questions:
  • Selecting the option to control Widows and Orphans will prevent _________. A single line from appearing at the top or bottom of
    10·1 answer
  • Which cost of purchasing a franchise would you still have if you start your own business​
    12·1 answer
  • When looking at a relationship between two tables on an ERD, the _____ table can be identified by the presence of a foreign key
    8·1 answer
  • Which browser should you choose if you want all viewing information except thumbnail previews of websites?
    15·2 answers
  • In an information systems framework, ________ is the bridge between the computer side on the left and the human side on the righ
    14·1 answer
  • Ok so this question is kinda weird but does anyone know what google drive is. If so how do you upload a video to it?
    11·2 answers
  • What videos do you think we should make next?
    9·1 answer
  • What is the most used gaming keyboard in 2022?
    8·1 answer
  • Is each of the following method identifiers (a) legal and conventional, (b) legal but unconventional, or (C) illegal?
    5·1 answer
  • The users, groups, and roles that have access to a server are called ______________________________.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!