1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fittoniya [83]
3 years ago
10

What does it mean when a computer can't break the rules

Computers and Technology
2 answers:
damaskus [11]3 years ago
5 0

Answer:

Maybe the type of computer you have has  rules added with them.

Explanation:

Hope this helps

-A Helping Friend

irga5000 [103]3 years ago
5 0

Answer:

first of all computer is a human made thing which means it has no choice of its own. Simply it will do what it is programmed to do. in other words programming is some rules in terms of codes through which software works in a computer so a computer won't ignore those rules because it has no control over them until and unless your computer consist of an artificial intelligence that learns on its own by going online but you can still restrict that AI whenever you want to. in short computer is something that depends on humans no matter how advance it is and will always work without breaking rules.    

Explanation:

You might be interested in
Use the five-step decision-making process discussed in Chapter 1 to analyze the following situations and recommend a course of a
RideAnS [48]

Answer:

The responses to this question can be defined as follows:

Explanation:

Yeah, their numerous sponsorships brands have potential. Every business does have its Trademarks for a commodity, that distinguishes others. It's an infringement for trademarks, it has only provided to those trivialities, which success and if I would plan this for my friend. I would never list or show those points of his accomplishments I never would Numerous sponsors. This should include all its information using its trademarks as well as other Site partners are excluded even though they are or are browsing their trademarks where the law is prohibited.

7 0
3 years ago
Why is it Called Eleven and Not Onety-One? This is an actual question I'm curious.
ANTONII [103]

Answer: Ten is not called onety because you have ten fingers and not nine. That part is actually extremely logical and straightforward. Besides, what do you think "ty" actually means? You suggest that we say "one ten" every time we want to say "ten". Now that is illogical.

Explanation:

7 0
3 years ago
Read 2 more answers
Question
LuckyWell [14K]

Answer:

you go to the what ever you use for the stuff i thing you want

Explanation:

6 0
2 years ago
Define stubs for the functions get_user_num() and compute_avg(). Each stub should print "FIXME: Finish function_name()" followed
elena-14-01-66 [18.8K]

Answer:

Replace your solution goes here with the following:

def compute_avg(num1, num2):

   func_name = "compute_avg()"

   print("FIXME: "+func_name)

   return -1

def get_user_num(user_num):

   func_name = "get_user_num()"

   print("FIXME: "+func_name)  

   return -1  

Explanation:

This defines the compute_avg function

def compute_avg(num1, num2):

This sets the function name

   func_name = "compute_avg()"

This prints the required output

   print("FIXME: "+func_name)

This returns -1

   return -1

This defines the get_user function

def get_user_num(user_num):

This sets the function name

   func_name = "get_user_num()"

This prints the required output

   print("FIXME: "+func_name)

This returns -1  

   return -1  

4 0
3 years ago
Which data type requires the greatest number of bytes in computer memory?
xxMikexx [17]

Answer:

Double precision number

Explanation:

The IEEE has given some Standards for representing numbers

IEEE Standards for floating point numbers is common convention for representing numbers in binary on Computers.

Double precision number format takes up 64 bits.

Single precision number format takes up 32 bits

4 0
3 years ago
Other questions:
  • Questions 1 )When does a spring tide take place?
    14·2 answers
  • All queries have an explicit location. true of false
    13·2 answers
  • Java uses ____ to implement method lookup.A) a jump tableB) an inheritance treeC) restricted accessD) polymorphism
    14·1 answer
  • Which of the following is a popular open source intrusion detection system that runs on SmoothWall?? Synchronous Dynamic Random
    6·1 answer
  • To rename a database object, press and hold or right-click the object in the navigation pane and then tap or click ____ on the s
    10·1 answer
  • Direct Mapped Cache. Memory is byte addressable. Fill in the missing fields based upon the properties of a direct-mapped cache.
    6·1 answer
  • How many countries don't uses the metric system?​
    12·2 answers
  • CALLING ALL DEKUS UWU
    15·2 answers
  • Aspire is a test you take to prepare for the<br> A. PSAT<br> B. SAT<br> C. ACT<br> D. FAFSA
    11·1 answer
  • Which option is typically only used when utilizing self joins?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!