1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nat2105 [25]
3 years ago
14

ANYONE GOOD WITH CODING IN C++

Computers and Technology
1 answer:
julsineya [31]3 years ago
3 0

Answer:

ok

Explanation:

i will search it for you give me a moment

You might be interested in
Write on the importance of Computer application to statistics​
tatyana61 [14]

Answer:

Another way to categorise the relation statistics-computer is to list the different ways the computer can be used in statistics. The following are examples of such uses: numerical and graphical data analy- sis; symbolic computations; simulations; storing statistical knowledge; presentation of results.

Explanation:

5 0
3 years ago
You are asked to provide a list of security groups a user is a member of. You write a script to pull the data from Active Direct
Whitepunk [10]

Answer:

I have no clue. I wish I could help though.

Explanation:

Sorry

7 0
3 years ago
How do I turn of the noise canceling feature on my beats studio wireless?
zysi [14]
You press and hold the "b" button on your left earmuff, but you have to hold it down as long as you want ANC (Automatic Noise Cancelling) to be turned off, in other words, as soon as you release the button, ANC will be turned back on. Unfortunately, this will also mute your music. 
5 0
3 years ago
How many degrees of freedom does any unconstrained object have in 3-D modeling?
Free_Kalibri [48]
I think its 6 degrees

3 0
3 years ago
A___________is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its
Molodets [167]

Answer: rootkit

Explanation:

Hi, A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.

A rootkit provides continued privileged access to a computer while hiding its presence. Because of this hiding characteristic it is very difficult to detect.

Once a rootkit has been installed, it allows someone to have total remote control of a computer and do things such as files executions and system changes.

4 0
3 years ago
Other questions:
  • The ________________ command tests connectivity by sending an echo request to a remote computer.
    14·1 answer
  • The mathematical constant Pi is an irrational number with value approximately 3.1415928... The precise value of this constant ca
    12·1 answer
  • Which statement is true about customizing presentation programs? A. You can add multiple animations to an object in a slide with
    14·2 answers
  • Cuando hablamos de entornos digitales de enseñanza aprendizaje a que nos estamos refiriendo
    10·1 answer
  • When selecting a color scheme for a project which two things should you consider?
    8·1 answer
  • Does anyone know the answers?
    8·1 answer
  • A basic program to find the area of a square​
    6·1 answer
  • Assume a future where security counter measures against DoS attacks are much more widely implemented than at present. In this fu
    7·1 answer
  • Please please help I don’t understand this please.
    11·1 answer
  • 56- What is the term used when you press and hold the left mouse key and more the mouse
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!