1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cupoosta [38]
3 years ago
11

@anthonydboss23 it’s goldielove6 .....this is not a question everyone ignore this

Computers and Technology
2 answers:
Readme [11.4K]3 years ago
7 0
No problem I suppose...
valentina_108 [34]3 years ago
6 0
Alright I'll ignore this
You might be interested in
The _device provides a means of communication between a computer and outer world.​
Liono4ka [1.6K]

Answer:

Explanation:

Peripheral device.

All the input/output devices are called as peripheral devices.

6 0
3 years ago
Define a function below called increase_elements_by_x, which takes two arguments - a list of numbers and a single positive numbe
zubka84 [21]

Answer:

function

increase_elements_by_x (list, x)

{

 var tplist = [];

 for (i = 0; i < list.length; i++)

   {

     tplist[i] = list[i] + x;

   print (tplist[i])}

 return tplist;

}

var list =[1, 3, 5];

var copyList;

var x = 3;

copyList = increase_elements_by_x (list, x);

print (copyList);

Explanation:

Create a list named list with initial data 1,3,5.

Create a function name increase_elements_by_x  which takes list and number as argument.Create empty list tplist. Loop through list, for ever index add x to list[index] and save to an empty list tplist. After loop is exited return tplist.

create a variable copylist and set it to increase_elements_by_x. Value returned by increase_elements_by_x  will be saved in copylist. print copy list to see content of copy list.

5 0
4 years ago
A systems engineer suspects a new type of malware has impacted the company network. Which threat hunting approach does the engin
Vlad [161]

Answer:

Analyze network traffic

Identify the method of execution

Explanation:

Threat Hunting is a form of cybersecurity strategy carefully formulated to recognize threats that are yet to be found by routine security monitoring.

Using the approach of Threat hunting means applying unconventional techniques to determine the threats or find the origin of the malware.

Hence, in this case, the system engineer should carry out the following steps:

1. Analyze network traffic

2. Identify the method of execution

3 0
3 years ago
How do you create a IOS app?
Ivahew [28]
I would use x code and watch tutorials on how to code on youtube
5 0
4 years ago
How has the internet improved business communication worldwide
emmasim [6.3K]

Answer:

One of the biggest changes for businesses is the communication technology enabled by the internet. The way people communicate with one another, share files, make purchases, and collaborate has completely shifted since the internet became widespread.

Explanation:

4 0
3 years ago
Other questions:
  • When you buy a trackphone, do you have to pay a monthly wage or do you just need to buy the minutes and that's all?
    13·2 answers
  • ________ viruses are often transmitted by a flash drive left in a usb port.
    8·1 answer
  • Which of the following is the most effective password?
    15·2 answers
  • During the _______ steps of the information processing cycle, data is manipulated, calculated, or organized to create useful inf
    9·1 answer
  • 2<br><br> What combination of keys turns the value in a cell into a percentage?
    12·1 answer
  • What structure is a candle​
    13·1 answer
  • Java Programming
    14·1 answer
  • Ask the user to input their grade percentage (e.g. the use will enter 98 if they had an overall grade of 98% in their course) fo
    6·1 answer
  • Which shortcut keys can be used to duplicate a slide?
    15·1 answer
  • On a wireless network use _____ to ensure that only authorized client computers are able to access the wireless network.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!