1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sergio039 [100]
3 years ago
8

I have a question involving do and for loops while using arrays.

Computers and Technology
1 answer:
larisa86 [58]3 years ago
5 0

Answer:

i just got my new pc

Explanation:

You might be interested in
I need help solving this problem on Picoctf. The question is What happens if you have a small exponent? There is a twist though,
soldi70 [24.7K]

Explanation:

Explanation:

RSA encryption is performed by calculating C=M^e(mod n).

However, if n is much larger than e (as is the case here), and if the message is not too long (i.e. small M), then M^e(mod n) == M^e and therefore M can be found by calculating the e-th root of C.

5 0
3 years ago
Simplify (6x+6)+(-3-4x) please hurry!!!!!
Ilia_Sergeevich [38]

Answer:

2x + 3

Explanation:

8 0
3 years ago
A mobile device user is having problems launching apps and texting. The user touches an app to launch it, but the app icon next
dalvyx [7]

Answer:

The screen protector may be interfering with the touch response

Explanation:

Screen protectors or commonly called screen guards are used to protect phone screens. In case they fall to the ground, these protectors act as shields to keep the phone screen from getting damaged. However screen protectors if not positioned or fixed properly may also cause hindrance to effective touch response as they become barriers to the touch screen.

8 0
3 years ago
Describe IT infrastructure. What is the role of business intelligence in determining the technology needs of a business?
mixas84 [53]

Explanation:

 The term IT infrastructure refer to an enterprise which is basically a collection of various hardware, software, network components, data network and data centers that are being used to do some development, testing related to IT related services. So the major components of IT infrastructure are:

1) Hardware solutions

2) Software Solutions

3) Various Network Component

4) Data Centers

Business Intelligence is basically a technology driven process that is being used analyze various data and the information in more effective and more informed way. The role of business Intelligence is given in following points:

1) Business Intelligence plays a vital role in identifying the technology required for our business.

2) As we knew that Business Intelligence is technology driven, so technology identification is major part that is being done my this process

3) With business Intelligence we chose the best technology required for our business, its help in increasing the profit of the business.

4) We can business Intelligence is the major process that deal with identifying all the technology needs of the business

8 0
3 years ago
Determine the exact output of the code:
stiv31 [10]

Answer:

3

Explanation:

The function floor() is used to give the integer which is smaller than or equal to the provided decimal value.

for example:

let a=5.8

floor(a);

the function provides the value 5 (smaller than or equal to 5.8).

In the given code:

variable num assigns the number 3.14.

then, floor(3.14) gives the value 3 (smaller than or equal to 3.14).

then, the echo print the value on the screen.

Therefore, the correct answer is 3.

4 0
4 years ago
Other questions:
  • A set of communication rules for the computer to follow is called, what?
    10·2 answers
  • Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in
    11·1 answer
  • • In your response, please include some examples of the three different types of storage.
    11·2 answers
  • Which type of image format is constructed using proportional formulas rather than pixels? This task contains the radio buttons a
    12·2 answers
  • When a person bullies someone using technology, it's called:
    9·2 answers
  • Free brainliest hehehehehehehheheh
    13·2 answers
  • The type of medium used to hide data in steganography is referred to as __________. This may be a photo, video, sound file, or V
    12·2 answers
  • Describe at least one issue of terrorism that has happened recently.
    14·1 answer
  • Which file is usually the first file to be displayed when you navigate to a website?
    5·1 answer
  • What is the "Driver's Compact Law"?
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!