1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Savatey [412]
3 years ago
9

What countries use this app besides the U.S.?

Computers and Technology
2 answers:
juin [17]3 years ago
7 0

Answer:

What App?

Explanation:

Naddik [55]3 years ago
3 0
35 countries! Hope this hleps
You might be interested in
Write a statement that calls a function named IncreaseItemQty, passing the variable addStock. Assign mugInfo with the value retu
PolarNik [594]

Answer:

Explanation:

#include <stdio.h>

#include <string.h>

typedef struct ProductInfo_struct {

char itemName[30];

int itemQty;

} ProductInfo;

ProductInfo IncreaseItemQty (ProductInfo productToStock, int increaseValue) {

productToStock.itemQty = productToStock.itemQty + increaseValue;

return productToStock;

}

int main(void) {

ProductInfo mugInfo;

int addStock;

addStock = 10;

scanf("%s", mugInfo.itemName);

scanf("%d", &mugInfo.itemQty);

**** /* Your solution goes here */ ****

printf("Name: %s, stock: %d\n", mugInfo.itemName, mugInfo.itemQty);

return 0;

}

8 0
3 years ago
Where should you look for most objective and unbaised information
jekas [21]
Google, would be the best because of all of the different site, hope this helps!
: )
8 0
3 years ago
What term is defined as private data placed in a packet with a header containing routing information that allows the data to tra
xeze [42]

Answer:

Encapsulation

Explanation:

Encapsulation is referring to the concept that data buding with some approach or method that is applied to that selected data.  it also restricts the use of some internal data of an object. The motive behind restricting the data is to prevent the misuse of the data.

For example- in java, encapsulation is refer to the wrapping of code with the data in one unit.

7 0
4 years ago
Jerry purchased 25 dozens of eggs. He used 6 eggs to bake 1 cake. How
Nina [5.8K]

Answer:

50

Explanation:

He bought 25 dozens of eggs:

25 (12) = 300

He used 6 eggs to make 1 cake, so:

300 eggs/6 eggs per cake = 50 cakes

8 0
3 years ago
Confidentiality, integrity, and availability (C-I-A) are large components of access control. Integrity is __________. ensuring t
bazaltina [42]

Answer: ensuring that a system is not changed by a subject that is not authorized to do so

Explanation: Access control refers to pribcues which are employed in the bid thlo ensure the security of data and information. It provides the ability to authenticate and authorize access to information and data thereby preventing unwarranted access and tampering of the information. Integrity in terms of data security and access control is is concerned with modification to an existing or original data by unauthorized sources. When unauthorized addition or subtraction occurs on a data, the integrity of such data has been compromised. Therefore, authorization is required whenever a source is about to access certain information whereby only those with the right authorization code will be allowed, Inputting an incorrect pass code after a certain number of tries may result in system lock down as access control detects a a possible intrusion

4 0
3 years ago
Other questions:
  • Suppose the algorithms used to implement the operations at layer k is changed. how does this impact services at layers k-1 and k
    10·1 answer
  • What function does a mobile device’s accelerometer serve?
    8·2 answers
  • If electricity comes from electrons, does morality come from morons?
    9·2 answers
  • Convert 234.43 (base 7) to base 10
    7·1 answer
  • Which type of computer do dedicated gamers and video editors prefer?​
    11·1 answer
  • Write an application that accepts a word from a user and converts it to Pig Latin. If a word starts with a consonant, the Pig La
    8·1 answer
  • Variables set equal to patterns are said to be:_______.
    7·1 answer
  • int FindFirstCharFrom(char* str, char *sought); The function FindFirstCharFrom takes pointers to two C strings as arguments, str
    13·1 answer
  • What does a wireless LAN (WLAN) act as to a wired network?
    12·1 answer
  • HELP PLEASE !!!!!!!!!!!! Amy needs to ensure that she can enter a parameter that will match the values End, deadend, and flatend
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!