1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
charle [14.2K]
3 years ago
5

Prompt the user to enter five numbers, being five people's weights. Store the numbers in an array of doubles. Output the array's

numbers on one line, each number followed by one space.
Computers and Technology
1 answer:
Tpy6a [65]3 years ago
4 0
Fddjdidueueyyehdbxhdhdhd
You might be interested in
What is the biggest difference between a movie and a game?
sveta [45]

Answer:

It could be D

Explanation:

3 0
3 years ago
Explain why Windows and Linux implements multiple locking mechanisms. Describe the circumstances under which they use spinlocks,
galben [10]

Answer:

The description for the given question is described in the explanation section below.

Explanation:

Depending on the needs of the device programmers these OS have various locking frameworks. Spinlocks become beneficial for preemptive multitasking processes during which a thread will operate in such an active loop instead of risking a rest queue latency. Mutexes become beneficial to utility lockers.

  • Solaris 2 employs flexible mutexes, indicating something like this on preemptive multitasking computers, the mutex is introduced with either a spinning switch.
  • Semaphores and state variations are much more effective methods for consistency where a commodity needs to be managed for such a prolonged period of time because spinning is unstable over a prolonged time.

8 0
3 years ago
It converts Assembly Language into machine language?​
docker41 [41]

Answer:

An assembler.

Explanation:

Input is (as with any programming language) files with lists of instructions (typically assembler mnemonics), output is a binary format representing these instructions in machine language.

6 0
3 years ago
Discuss the importance of the coordinated attention to the 3 broad areas of InfoSec (pillars): Computer Security, Data Security,
True [87]

Answer:

Computer security, includes network security and data security

Explanation:

It is very important to be aware of computer security, then I provide the definitions of each of the three pillars.

Computer security:

Take into account that there is no absolute security, however, risks must be minimized.

 In this section, confidentiality, integrity, availability, and authenticity are important.

It also includes physical security (hardware), software security (network) and data security.

Data Security:

It is the set of logical systems whose function is to coordinate the hardware and software (registers, packages that travel through the network, etc.).

Network Security:

The goal is the advanced detection of botnets and malware callbacks. It must be prevented from intrusions.

5 0
3 years ago
What is it called when you remove some information from a file or remove a file from the disk ? A) save b) delete c) edit d) rem
Kamila [148]

Answer:

delete is the answer okkkkkkkkkkkkkkkk

3 0
3 years ago
Other questions:
  • Raul looks at different technologies that will help him do his job. What part of the process is this?
    13·1 answer
  • Recovery point objectives of a recovery plan specify ________.
    11·1 answer
  • A .jpg file is an example of which of the following file types
    15·2 answers
  • What is the standard markup language of the world wide web?
    14·1 answer
  • Each pixel includes 3 colors; Red, Green and Blue. Each color uses 8 bits to store it's intensity. How many Bytes are needed for
    12·1 answer
  • Choose all of the items that represent parts of an operating system.
    6·2 answers
  • FIFTY POINTS IF YOU CAN HELP ME!!!!
    11·1 answer
  • PYTON CODERS I NEED HELP I WILL GIVE BRAINLIEST!!! Why is this python code giving me problems?
    12·1 answer
  • How many 2/8 pound patties can she make from 7/8 of a pound of hamburger
    10·1 answer
  • Electronic hacking and illegal trespassing for the purposes of acquiring a competitor’s proprietary information is considered.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!