1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
solniwko [45]
3 years ago
14

How do i do this?

Computers and Technology
1 answer:
Ksivusya [100]3 years ago
5 0

Answer: deezzz mf nuts

Explanation:

You might be interested in
Variables defined inside a member function of a class have: Block scope. Class or block scope, depending on whether the binary s
Snowcat [4.5K]

Answer:

The answer is "Block scope".

Explanation:

In the programming, the scope is a code, in which it provides the variable ability to exist and not be retrieved beyond variable. In this, the variables could be defined in 3 locations, that can be described as follows:

  • Inside a method or the block, which is also known as a local variable.
  • Outside of the method scope, which is also known as a global variable.
  • Defining parameters for functions known as formal parameters.
8 0
3 years ago
Which of the following is the most significant outcome of the formation of the SMPTE?
olga55 [171]

Answer:

The SMPTE created an organized system of film technology, development, and distribution.

Explanation:

The SMPTE opened the door for Union organization within the film industry is true but not the most significant outcome of the formation of the SMPTE. However, the second option is certainly the most significant outcome as SMPTE is the most organized system of film technology, development, and distribution. And the other two options are also correct but the most significant outcome of the formation of the SMPTE is the second option.

7 0
2 years ago
Sales management wants a small subset of users with different profiles and roles to be able to view all data for compliance purp
Lapatulllka [165]

Answer:

Last Option is correct answer. ( Option D)

Explanation:

Option A is rejected because this will allow the view permission but as mentioned the management want a new profile for the users as well.

Option B is rejected because again it will not facilitate the different profile requirement.

Option C is not answer because It will only help in viewing the data and granting permission.

Option D is selected because it will meet both requirements which are to make a new profile first of all and then grant the View permissions to these profiles for the user subset.

7 0
3 years ago
What type of coverage pays for damage incurred as a result of theft, vandalism, fire or natural disaster?
Sloan [31]

Comprehensive or hazard insurance

5 0
3 years ago
P16 Consider the following network. ISP B provides national backbone service to regional ISP A. ISP C provides national backbone
Art [367]

Solution :

Considering the following data :

$\text{ISP B}$ provides the national backbone to the regional $\text{ISP A}$.

$\text{ISP C}$ provides the national backbone to the regional $\text{ISP D}$.

Each of the ISP consists of one autonomous systems (AS).

$\text{ISP B}$ would like to hand over the traffic of C through the $\text{West}$ Coast.

The $\text{ISP C}$ would like to receive traffic from B's peering point via East Coast.

One way for $C$ to force $B$ to hand over all of $B$’s traffic to $D$ on the east coast is for $C$ to  only advertise its route to $D$ via its east coast peering point with $C$.

7 0
2 years ago
Other questions:
  • How did the discovery of glossopteris support wegner's continental drift hypothesis?
    15·1 answer
  • Which osi reference model layer includes all programs on a computer that interact with the network?
    13·1 answer
  • Most large organizations store data through a strategy called a(n) ________ to promote efficient and safe use of data across the
    11·1 answer
  • How much a T-mobile plan cost​
    11·2 answers
  • a sign is to be hung from the end of a thin pole, and the pole supported by a single cable. your design firm brainstorms the six
    13·1 answer
  • A technician is configuring the Windows computers on a network to print to a printer that is directly connected to the network v
    8·1 answer
  • What happens when you call someone whose phone is off?
    6·2 answers
  • 3.4 lesson practice quiz edhesive
    11·1 answer
  • Write a program that allows the user to enter their name from the keyboard. Allow the user to pick how many times they want thei
    12·1 answer
  • Which of the following techniques can you not use to make the members of the std namespace available to your code? a. Code a usi
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!