1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
weqwewe [10]
4 years ago
5

I will mark brainiest plz help ASAP

Computers and Technology
1 answer:
Reil [10]4 years ago
7 0

Answer:

Usually by: following study schedules and mark down your own time schedules.

You might be interested in
The analysts at Techno Info Systems are considering the four-model approach to system development for a new client. If they make
Natali [406]

Answer:

Option B is correct.

Explanation:

Within Techno Info Systems the user has been analyst contemplating that four-model concept towards computer development for such its new customer. When they adopt that four-model method, thus the result seems to be the time taken to implement the rises in the method.

So, therefore the other options are incorrect according to the following scenario.

4 0
3 years ago
I don't understand how to write both. If I repeat the first code but with 3 and 6 it doesn't work.
hram777 [196]

It looks like you need to get both numbers from the input. Try doing something like this:

print(int(input()) + int(input()))

4 0
3 years ago
Why does the PC send out a broadcast ARP prior to sending the first ping request
Norma-Jean [14]

Since the ARP broadcast is utilized to request the MAC address of the Host with the IP address contained in the ARP, the PC needs to know the destination of MAC address before it can produce the frame header for the particular PING requested, before it can send a PING to a host.

5 0
3 years ago
Can someone help me out? I need to know what is 1 example of computer hacking?
cricket20 [7]
One way to know if someone is hacking you r computer is if you give them all the information about you. and they start texting and saying will you go n a date with me. And . then that person gets it and says: who is hacking into my computer. That is how you know someone  is hacking into your computer. The reason why is i saw a show who did that once. And plus I do my reasearch so I would know this anyway
6 0
4 years ago
What is a file path?
adoni [48]

Answer:

Similarly, in the computer world, a path defines the location of a file or folder in a computer's file system. Paths are also called "directory paths" because they often include one or more directories that describe the path to the file or folder. A path can either be relative or absolute.

(Brainliest please)

6 0
3 years ago
Other questions:
  • Why was the movable type of the printing press such a breakthrough for publishing?
    15·2 answers
  • Emily has to create an audio-visual presentation on animated movies. Which input device will she be LEAST likely to use while cr
    6·1 answer
  • Including quotes in your paper can bring additional meaning to the content True are false
    11·2 answers
  • Why are high-quality transformers wound with large diameter wire?
    8·1 answer
  • The top 3 most popular male names of 2017 are Oliver, Declan, and Henry according to babynames.
    7·1 answer
  • True or false A job analysis weight the positives and negative of a given career
    13·1 answer
  • A drink costs 2 dollars. A taco costs 5 dollars. Given the number of each, compute total cost and assign to totalCost. Ex: 2 dri
    11·1 answer
  • The words, the computer is the future, has how many bits?
    12·1 answer
  • What does this mean startUp()
    13·1 answer
  • Write a function solution that given an array a of n integers (between -100 and 100), returns the sign (-1,0,1) of product of al
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!