1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hoa [83]
3 years ago
14

Please help, Tech class!!

Computers and Technology
1 answer:
IRISSAK [1]3 years ago
3 0

Answer:

Explanation:

1=A

2=A

3=A

4=True

5=A

6=D

7=D

8=B

9=True

10=C

You might be interested in
Write the output of the following program:
Iteru [2.4K]

Answer:

Expression A

Explanation:

In this Pseudocode, the output would be 100. This is because the code is looping from 1 to 20 and adding together all of the odd numbers between 1 and 20. Since it is checking to make sure that the remainder of each number is not equal to 0 which would indicate an odd number, and if it is odd then it adds it to the variable S. Therefore, the odd numbers between 1 and 20 are the following...

1 + 3 + 5 + 7 + 9 + 11 + 13 + 15 + 17 + 19 = 100

6 0
3 years ago
With which type of satellite is there a propagation delay?
Flauer [41]

Geostationary satellites have a high propagation delay.

8 0
3 years ago
_____ is a method of access control that prevents unauthorized users from using an unattended computer to access the network and
Hoochie [10]

Answer:

Terminal Resource Security

Explanation:

Terminal Resource Security is a type of access control that prevents unwanted user from using a computer that is not in use to access the data and network. It is feature in a software that ensures that the screen of a computer is erased and a user is automatically signed off after a particular length of inactivity. It is used by many organizations.

5 0
3 years ago
Print ___________ command is used for adding numbers.​
quester [9]

Answer:

phyton is the answer....

5 0
3 years ago
Explain one rule the company must follow when using cookies on its website.
ololo11 [35]

Explanation:

Work out what cookies your site sets, and what they are used for, with a cookie audit.

Tell your visitors how you use cookies.

Obtain their consent, such as by using Optanon, and give them some control.

7 0
3 years ago
Other questions:
  • James was having coffee and overhead a conversation between two men who talked about the fact that their friend could not find a
    10·1 answer
  • A(n) ________ network is a computer network that spans a relatively small area, allowing all computer users to connect with each
    14·1 answer
  • Operating systems that have windows and icons have which type of user interface?
    15·1 answer
  • Jeff is preparing for a presentation on effective communication skills. He has to face an audience of over 50 people. Which stra
    9·2 answers
  • What role do mobile devices play in shaping the world?
    5·2 answers
  • To alter just one character in a StringBuilder, you can use the ____ method, which allows you to change a character at a specifi
    5·2 answers
  • Bgtdeberbaf raaaaaaaaaaaaaaaaaaaaa graaaaaaaaaaaaaaaaaaaaaaaaaaa
    11·1 answer
  • Write a program that include a method that returns the sum of all the elements of a Linked List of Integers. Allow the user to e
    11·1 answer
  • How is communication within healthcare different than communication within other industries ?
    13·1 answer
  • We _____to separate the code in sub programs from the main code<br><br> Please help!!
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!