1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svlad2 [7]
3 years ago
13

I have some IT problem. Can I find a programmer here?

Computers and Technology
1 answer:
Jlenok [28]3 years ago
3 0
If it's a hardware problem, find a mechanic or buy replacement parts.
If it's a software issue, someone ranked high on Brainky may know the programming language.
A handy hint is just to ask! If your question isn't answered, try elsewhere!
You might be interested in
Which line in the following program contains the header for the showDub function? 1 #include 2 using namespace std; 3 4 void sho
Flura [38]

Answer:

The answer to this question is "15 line".

Explanation:

A function is a block of ordered, portable code used to perform a single, connected operation. The syntax of function declaration can be given as:

Syntax :

returntype functionName(parameter1, parameter2); //function prototype

or declaration

returntype functionName(parameter1, parameter2) //function definition or header of the function  

{  

//function body.

//function implementation

 //return value;

}

In the given question the header of the showDub function is on line 15.

That's why the answer to this question is "15 line".  

8 0
3 years ago
An early attempt to force users to use less predictable passwords involved computer-supplied passwords. The passwords were eight
Sedaia [141]

Answer:

Recently, with the new and advanced hacking algorithms and affordable high-performance computers available to adversaries, the 36 character computer suggested passwords can easily be insecure.

Explanation:

The 8 length passwords generated pseudo-randomly by computers are not secure as there are new algorithms like the brute force algorithm that can dynamically obtain the passwords by looping through the password length and comparing all 36 characters to get the right one.

And also, the use of high-performance computers makes these algorithms effective

7 0
3 years ago
Wich is the correct process for selecting an entire row in a spreadsheet?
umka21 [38]
CTRL - (select sentence) - ALT

4 0
2 years ago
Bye guys imma k.ill myself for real this time.
oksano4ka [1.4K]

Answer:

bro no- why?

Explanation:

7 0
2 years ago
Read 2 more answers
Suggest why people might not want the government to carry out Internet surveillance?​
Vadim26 [7]
Suggest why people might not want the government to carry out Internet surveillance?
To see your history all that p o r n ya watch
Pls mark me brainliest;p
3 0
2 years ago
Read 2 more answers
Other questions:
  • When creating a professional presentation, how many typefaces are recommended at the most?
    5·1 answer
  • Your essay is due tomorrow and you don't have time to write it. You decide to buy an essay online. You've paid for it, so it can
    12·1 answer
  • ____ languages create source code using words and structures similar to spoken language.​
    15·1 answer
  • // This pseudocode should create a report that contains an
    14·1 answer
  • Explain word processing ​
    11·2 answers
  • Information is best described as
    10·1 answer
  • The process in which a server is partitioned into smaller components virtually.
    9·1 answer
  • Risk taker positive or negative​
    8·1 answer
  • What types of company functions are aided by ERP?
    9·1 answer
  • What is the name for data generated by a computer using an algorithm?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!