1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alik [6]
3 years ago
15

Help with computer. homework

Computers and Technology
1 answer:
drek231 [11]3 years ago
8 0
Im pretty sure the answer would be 82 because it's concatenating 2 to string(y)
You might be interested in
A virus has attacked your hard drive. Instead of seeing the Windows Start screen when you start up Windows, the system freezes a
Yanka [14]

Answer:

Boot to safe mode

Explanation:

When a virus attacks boot system, that is to say, Windows program won´t load. The following steps should be considered taking into account what Windows Version is being used, Windows 7, 8 or 10:

1. Press  F8 (Windows 7) F4 (Windows 8, 10)

2. Enable Safe Mode

3. Run Safe Mode

4. Once in safe mode the user will have access to Windows and eventually document files can be extracted via pendrive.

5 0
3 years ago
Please help me! No one ever does! will give 30 points and brainliest!
Alekssandra [29.7K]

Answer:

The term digital citizenship, also known as e-citizenship or cyber-citizenship, refers to the use of Information and Communication Technologies (ICT), and the principles that guide them, for the understanding of the political, cultural and social issues of a nation.

More Content by Concept

In other words, it is about citizen participation through digital or electronic environments and interfaces, through the Internet and Social Networks.

Digital citizenship is part of the electronic government system or digital democracy, which precisely consists of the administration of State resources through new ICTs and all their potential, to make life easier for citizens.

In this way, a digital citizen has the right to access information online in a safe, transparent and private way, in addition to the social and political participation that 2.0 media allows.

Explanation:

6 0
2 years ago
Estimating the cost of a network is ______ complex than estimating the cost of onenew piece of data processing hardware.a.much m
ipn [44]

Answer:

a

Explanation:

your answer is the first one

5 0
3 years ago
Although there are three well-known operating systems, the most common are Microsoft Windows and Mac OS. Discuss the similaritie
tiny-mole [99]

Answer:

There are very few similarities beyond some convergent features of their respective user interfaces. Their internal architecture is very different, differing from kernel models to shell integration to executable formats. A comprehensive list of similarities is neither possible nor useful, because it would consist mostly of obvious statements like "They are both operating systems" or "They both have graphical user interfaces, "They both include

Explanation:

How's that?

7 0
2 years ago
According to the narrator of "EPIC 2015, in 2015, "news" is:
statuscvo [17]

Answer:

D created by apathetic journalists who care little how true a story is.

Explanation:

D

6 0
3 years ago
Read 2 more answers
Other questions:
  • Plane eyes I don't know
    9·1 answer
  • What are the properties of magnetic field​
    8·1 answer
  • Consider the following program segment: //include statement(s) //using namespace statement int main() { //variable declaration /
    9·1 answer
  • Which of these is not considered a final step when creating a Podcast? Getting a loan to help with the cost of the equipment. Ch
    6·1 answer
  • COMPUTER CODING
    5·1 answer
  • Hi, please help me complete my Database Development 2 hw by completing what should been done from the document and show the code
    11·1 answer
  • For those that play pc games how do you go outside in The Sims 2?
    7·2 answers
  • Short notes on primary key​
    6·1 answer
  • What are good reasons to do yearly disaster recovery testing? check all that apply
    10·1 answer
  • Missing appropriate security hardening across any part of the application stack or improperly configured permissions is an examp
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!