1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Basile [38]
3 years ago
7

PLEASE HURRY PLEASE HELP THIS CLASS ENDS TODAY AND I NEED HELP

Computers and Technology
1 answer:
Fofino [41]3 years ago
6 0

Answer:

She could have given access to the computer to the techician

Explanation:

"as well as any special settings or configurations she thinks may be relevant." This might inculd any information to hack the computer

You might be interested in
Write code that prints: usernum ... 2 1 blastoff! your code should contain a for loop. print a newline after each number and aft
Svetradugi [14.3K]

You never said what language so I used C

#include <stdio.h>

<span>int main () { </span>

<span>  int a;  </span>

<span>  for( a = 3; a > 0; a-- ){ </span>

<span>      printf("%i \n", a); }</span>

<span>  printf(" Blast OFF !!!\n");   </span>

<span>return 0; </span>

<span>}</span>

4 0
3 years ago
Ano kaya ang nararamdaman mo at mangyari sayo kung tatlong araw ka nang hindi kumakain​
Feliz [49]

Ang mararamdaman mo ay pananamlay at tila walang lakas. Ang mangyayari sayo ay magkakasakit ka at pag ipinagpatuloy mo parin ang hindi pag kain, baka hindi lang sakit aabotin mo kundi kamatayan.

3 0
3 years ago
A loop that will output only the names that come before "Thor" in the alphabet from the names list.
matrenka [14]

names = ["Kevin", "Joe", "Thor", "Adam", "Zoe"]

names.sort()

for x in names:

   if x == "Thor":

       break

   else:

       print(x)

I made up my own names for the sake of testing my code. I wrote my code in python 3.8. I hope this helps.

3 0
3 years ago
.حدد/ي الكيانات في النظام
olasank [31]

Answer:

what

Explanation:

6 0
3 years ago
Read 2 more answers
Look at the following assignment statements:
ziro4ka [17]

Answer: number 2 is the correct way to do it

Explanation:

3 0
3 years ago
Other questions:
  • What are the Positive and negative sites of the internet
    14·1 answer
  • Which logic gate produces an output of 1 only if both it’s inputs are 0?
    5·1 answer
  • Lisa wants to send an email with some confidential Information. Which of these options would work best for her?
    6·1 answer
  • Given the security levels TOP SECRET, SECRET, CONFIDENTIAL, and UNCLASSIFIED (ordered from highest to lowest), and the categorie
    13·1 answer
  • The introduction of new information technology has a: A. dampening effect on the discourse of business ethics. B. waterfall effe
    14·1 answer
  • Maria is comparing her history project's second-place award to her classmate's first-place award. She starts planning how to win
    9·2 answers
  • Yo, my Lenovo laptop keeps showing this screen but I can't sign in, can someone help me?
    5·2 answers
  • In many supermarkets customers can pay for their shopping using credit cards. (a) Name two items of information stored on the ma
    8·1 answer
  • A(n) ___________________ is a set of characters that the originator of the data uses to encrypt the text and the recipient of th
    10·1 answer
  • Mario is designing a page layout for a sports magazine, and he decides to add the image of a cyclist. Which principle of page la
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!