1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexandr402 [8]
3 years ago
11

50 POINTS & A FOLLOW!

Computers and Technology
2 answers:
Aleks [24]3 years ago
7 0

There is an error in III: println is for print line so it is different from print(lotteryNum).


The answer is III only.


Darya [45]3 years ago
6 0

III has a typo: its print...lower case l (L)n; not print...cap I (i)n. ive made the same mistake be4!

I n II look good 2 me


You might be interested in
Computer-based networks that trigger actions by sensing changes in the real or digital world are known as: global marketing plat
Gennadij [26K]
It known as the smart systems

It make decision by describing and analyzing the available data in a predictive or adaptive manner thereby performing an efficient and smart actions based on that analysis

A lot of smart systems evolved from micro systems
8 0
3 years ago
Microsoft <br> Excel Module 6
Sonbull [250]

Answer:

what Is your question?

6 0
3 years ago
A cell reference with only one dollar sign before either the column or the row is called an absolute reference.
BlackZzzverrR [31]
False, absolute references have two dollar signs
4 0
3 years ago
network consisting of computers and other devices that are eithrr fully or partially connected to each other
tekilochka [14]

The answer is a Mesh topology. This method connects every device to each other device in the network. A wired full-mesh topology is not as common as it is impractical and highly expensive. A partial mesh topology offers redundancy if one of the connections goes down and usually uses a connecting medium such as a router to eliminate cables and expensive PCI NIC's.

8 0
3 years ago
When first defining the cloud, NIST gave three service models, which can be viewed as nested service alternatives: software as a
irakobra [83]

Answer:

Infrastructure.

Explanation:

In Computer science, Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives. It offers individuals and businesses a fast, effective and efficient way of providing services.

Simply stated, Cloud computing are services or programs located on the Internet, they are usually remote resources making use of cloud storage.

When first defining the cloud, National Institute of Standards and Technology (NIST) gave three (3) service models, which can be viewed as nested service alternatives;

1. Software as a Service (SaaS).

2. Platform as a Service (PaaS)

3. Infrastructure as a Service (IaaS).

According to NIST, the five (5) characteristics of a cloud computing service are;

1. On-demand self-service .

2. Broad network access .

3. Resource pooling .

4. Rapid elasticity .

5. Measured service.

Additionally, the cloud service can either be deployed as private, public, hybrid or community service.

6 0
3 years ago
Other questions:
  • You need to put cabling for connecting two new computers in a room, which did not have any network infrastructure. Because of th
    9·2 answers
  • An icon in a document preset that looks like the play button on a YT video, what type of document is the preset meant to be used
    13·2 answers
  • The most likely reason that company computers connected to the Internet should use anti-virus protection software is..?
    5·1 answer
  • We will pass in 2 values, X and Y. You should calculate XY XY and output only the final result. You will probably know that XY X
    13·1 answer
  • Suppose that we can improve the floating point instruction performance of machine by a factor of 15 (the same floating point ins
    13·1 answer
  • A member function of a derived class may not have the same name as a member function of a base class
    9·1 answer
  • What is the FaFASA4caster used for
    10·1 answer
  • Difference between private and confidential data?​
    5·1 answer
  • 25 POINTS PLATO
    6·2 answers
  • 11:25
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!