1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
likoan [24]
4 years ago
11

The old german word brouh, which meant "wet ground," became the old english word broc, which meant "stream." which modern englis

h word is a cognate of broc?
a. bark
b. beak
c. brook
d. broke
Computers and Technology
2 answers:
Marat540 [252]4 years ago
4 0
Its 100% A bark and i am writing extra cause My answer has to be more than 20 letters
Leno4ka [110]4 years ago
3 0

The answer to the question is brook.

You might be interested in
Compare the encryption algorithms found in s-tools: idea, mdc, des, and 3des.
grin007 [14]
Are their answer chocies 

3 0
4 years ago
You review a design written by somebody else for an application and you find these: - an interface Shape with a method draw() -
laila [671]

This is the Composite pattern, one of the "Gang-of-Four" design patterns (check out their book!).

6 0
3 years ago
100 POINTS!!!
aleksklad [387]

Answer:

Hmm.. Try researching, I'm sure you'll find something there..

7 0
3 years ago
4.12 LAB: Using math methods Given three floating-point numbers x, y, and z, output x to the power of z, x to the power of (y to
Greeley [361]

Answer:

The function is as follows:

import math

def func(x,y,z):

   print(math.pow(x, z))

   print(math.pow(x,math.pow(y, z)))

   print(math.fabs(y))

   print(math.sqrt(math.pow(x*y,z)))

Explanation:

This imports the math library

import math

This defines the function

def func(x,y,z):

Print the stated outputs as it is in the question

<em>    print(math.pow(x, z)) ---> x to power x</em>

<em>    print(math.pow(x,math.pow(y, z))) ---- x to power of y of z</em>

<em>    print(math.fabs(y)) ---- absolute of y</em>

<em>    print(math.sqrt(math.pow(x*y,z))) --- square root of xy power x</em>

<em />

4 0
3 years ago
A company asked you help mitigate the brute force attacks carried out against its users' Windows account passwords. You successf
prohojiy [21]

Answer:

The following options are true.

Explanation:

A corporation has requested the user to support minimize the brute force attacks on credentials of their Microsoft account holder's. They effectively eliminated the malware involved in those assaults and have to protect their credentials allocated towards their user profiles properly without restricting the usefulness of the program.

The following should be included in securing the user accounts are need credentials for the user profile, create logon constraints that failed as well as need powerful credentials.

7 0
3 years ago
Other questions:
  • A programming error that causes a program to generate incorrect results due to failing to use the proper combination of statemen
    14·1 answer
  • What type of data visual would you use to illustrate trends over time? Gantt chart Bar graph Line chart Scatter diagrams
    5·1 answer
  • You need to write th java syntax for the expression “7 is greater than or equal to 3” choose the best answer
    8·1 answer
  • Refer to the following statement: “We have implemented several IT solutions:
    14·1 answer
  • What are some pros for having your phone during school hours?
    10·2 answers
  • What are the programs required to work in computer
    7·1 answer
  • Which of the following represents the biggest difference between asymmetric and symmetric cryptography?
    9·1 answer
  • Desirable workplace habits and skills include:
    14·1 answer
  • Which three IP addresses may be pinged by the Test Management Network feature in the ESXi hosts DCUI
    12·1 answer
  • Which trait can be a positive or negative?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!