1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
-BARSIC- [3]
3 years ago
15

ASAP!!!!****** Need help!!!!

Computers and Technology
1 answer:
m_a_m_a [10]3 years ago
6 0
I think it's right. 
<span>Text, numbers, graphics, or sound represented by discrete digits, such as 1s and 0s.</span>
You might be interested in
In the following code, what is the first line that introduces a memory leak into the program?
Fantom [35]

Answer:

The answer is "Line 13".

Explanation:

In the given code first, a header file is included for using basic function, In the next line the main method is defined in this method two-pointer variable is declared that is "numbers1 and numbers2", in which variable numbers1 holds a value that is "NULL".

  • In the next line, both variable uses malloc() function that is used to allocate memory in heap, and in this function, sizeof() function is used that print its size and also increase its value.
  • In the next step, a pointer variable numbers1 assigns a value and another variable numbers2 assigns numbers1 variable value and changes the numbers1 variable.
6 0
4 years ago
A unique aspect of Java that allows code compiled on one machine to be executed on a machine of a different hardware platform is
notka56 [123]

Answer:

Java's bytecode

Explanation:

To execute its operations, java programming languages uses bytecodes.

These bytecodes are literally instructions of a java virtual machine (or JVM). They are generated in form of a class file as soon as the java program is ran and executed. In other words, the java compiler compiles the code and generates the bytecode.

As soon as the bytecode is generated, it can be transferred to a different machine and platform completely and one can run this bytecode on this different machine.

8 0
3 years ago
PLEASE HELP YOU GUYS
lorasvet [3.4K]
C stay away from his or her vechicle
3 0
3 years ago
Read 2 more answers
A human subject’s photographs show two catchlights in each eye that are unwanted by the photographer. What is the most likely ca
Sphinxa [80]
A human subject's photographs show two catchlights in each eye that are unwanted by the photographer. what is the most likely cause of this problem? the fill light is too strong. the main light is too high.
7 0
3 years ago
Which access database object asks a question about the data stored in a database and displays specific fields and records that a
elena-14-01-66 [18.8K]
The Query object is used to asks a question about the data stored in a database and displays the specific fields and records that answer the question.

In code form, the select command is used for queries. 
6 0
3 years ago
Other questions:
  • ____ allows someone browsing the internet to click on words or phrases, enter his or her phone number, and continue browsing
    11·2 answers
  • Why does the PC send out a broadcast ARP prior
    14·1 answer
  • Consider the following list.
    5·1 answer
  • Write a fragment of code that will read words from the keyboard until the word done is entered. For each word except done, repor
    14·1 answer
  • Computer architecture:
    6·1 answer
  • The motion of any object can be broken down into it's component (parts of) vectors. true or false
    5·1 answer
  • One of the prominent movies released in the 1950s is
    15·2 answers
  • Match the elements used in web searches to their functions.
    12·1 answer
  • 10. Realice un algoritmo que solicite números y los sume, solo se detendrá cuando se ingrese un número negativo.
    10·1 answer
  • What does c++ programming mean?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!