1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
barxatty [35]
3 years ago
12

HELP 15 POINTS

Computers and Technology
2 answers:
masya89 [10]3 years ago
6 0

Answer:

A I think I might be wrong

zimovet [89]3 years ago
3 0
Answer: I believe it’s A too
You might be interested in
The Synonyms submenu offers a list of synonyms for a word. Is it always a good idea to use whatever synonyms are presented on th
Ann [662]

Answer:

No

Explanation:

Synonyms are sometimes NEARLY the same. Not exactly the same. Therefore the meanings can change a bit. For example a synonym for "bad" is "careless."

"I think corn is bad."

and

"I think corn is careless." - this sentence wouldn't make sense.

That's why, no, you shouldn't ALWAYS use the synonym.

7 0
2 years ago
During a test, it is generally best to: A. answer all questions in order B answer the essay questions first C. answer the least
Alecsey [184]

C. answer the least challenging questions first

because then you get those out of the way and have more time to focus on the harder questions.

5 0
3 years ago
Read 2 more answers
Illia is a network administrator at a company.which tasks is she responsible for
irina1246 [14]

Answer: They organize, install, and support an organization's computer systems, including local area networks (LANs), wide area networks (WANs), network segments, intranets, and other data communication systems.

Explanation:

6 0
2 years ago
Is there such a thing as an ethical reason for unauthorized access into a computer system?
Anastaziya [24]
Of course there is. On a simple level, consider a parent trying to locate their missing child. Someone might break into their social media accounts to see if there are messages that might help determine their whereabouts.

Consider a website hosting inappropriate pictures of children. Breaking into the server hosting the files and removing them is 100% ethical. 

I'm sure you can think of more examples. 
7 0
2 years ago
I need help on this, need answer asap.
FinnZ [79.3K]

Answer:

int main() {

int _2dArray[32][32];

for (int i = 0; i < 32; i++) {

 for (int j = 0; j < 32; j++) {

  _2dArray[i][j] = j + i * 32;

 }

}

return 0;

}

Explanation:

Here is a generic C/C++ 2d array traversal and main function example. The rest you'll have to figure out based on what kind of app you're making.

Good luck!

6 0
2 years ago
Other questions:
  • The maximum number of colors that should be used on a slide is _____. 2 4 6 8
    12·2 answers
  • A network protocol is a set of rules defining communication between two devices. True False
    8·2 answers
  • Why does world of tanks keep downloading when I'm not even at the computer
    9·1 answer
  • Which of the following involves writing hidden messages so that only the sender and intended recipient know a message exists? St
    5·1 answer
  • A program needs to allow a customer to input integers until the input number is zero. When the input number is zero, the program
    14·1 answer
  • A program that doesn’t work properly needs to be debugged. true or false
    8·1 answer
  • A physical host machine has four quad-core CPUs, 16GB of RAM, 1TB of hard drive space, and two 1Gbps NICs. If we need to create
    8·1 answer
  • ¿Cuál es la función que cumplía los sofistas y Porque eran tan importantes?​
    13·1 answer
  • Which of the following is a characteristic of vector graphics?
    15·2 answers
  • This code --&gt; plt.plot(x,y) is used to draw :
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!