1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paul [167]
3 years ago
9

Information about hardware engineers?

Computers and Technology
1 answer:
Gemiola [76]3 years ago
7 0

Answer: hardware engineers research, design, develop, and test computer systems and components like circuit boards. Computer hardware engineers research, design, develop, and test computer systems and components like processors, circuit boards, memory devices, networks, and routers.

Explanation:

You might be interested in
All of the following are forms of verbal communication except
Radda [10]
B. hand gestures
these are not verbal.
4 0
3 years ago
Read 2 more answers
Being nice take the points​
MArishka [77]

Answer:

Sure!!! and thank you very much

4 0
3 years ago
Write the definition of a function named count that reads all the strings remaining to be read in standard input and returns the
spayn [35]

Answer:

The function written in C++

int str(string word) {

int count = 1;

for(int i =0; i<word.length();i++) {

 if(word[i] == ' ') {

  count++;

 }

}

return count;

}

Explanation:

This line defines the function

int str(string word) {

This line initializes count to 1

int count = 1;

This line iterates through the input string

for(int i =0; i<word.length();i++) {

This line checks for blank space

 if(word[i] == ' ') {

Variable count is incremented to indicate a word count

  count++;

 }

}

return count;

}

<em>See attachment for full program</em>

Download cpp
8 0
3 years ago
In the context of intentional computer and network threats a ____ is a programming routine built into a system by its designer
lara31 [8.8K]

Answer:

a. backdoor

backdoor (also called a trapdoor) is a programming routine built into a system by its designer or programmer. It enables the designer or programmer to bypass system security and sneak back into the system later to access programs or files.

6 0
3 years ago
Read 2 more answers
Given:
777dan777 [17]

Answer:

Python Code:-

#creating a list  

current_members = [4, 6, 9]

#defining the variable  

#assigning the value

member_id = 9

#defining variable count

count = 0

#defining the variable and setting initial value to true

is_a_member = False

#for loop is used to iterate over the list  

for x in current_members:

  #if statement will check whether the element is found

  if x == member_id:

      #set the value to true if the value is matched  

      is_a_member = True

      #set the value to 1

      count = 1

#if count == 0

#set the value of is_a_member variable to false

if count == 0:

  is_a_member = False

#print the current value stored in is_a_member variable

print(is_a_member)

Explanation:

In the above python program, a list is created that is "current_members"  and some values are inserted. In the next line, a three-variable is defined that are member_id, count, and is_a_member.

  • In both variable member_id, count assigns some value. and in is_a_member variable assign a False value.
  • Using a for loop to iterate over the list.
  • Inside the loop, If the statement will check whether the element is found. Then set the value of is_a_member variable to True and count to 1.
  • Another if the statement is used which checks the value of the count variable. If the value of count is 0 then set the value of is_a_member to False.
  • print() function is used to display the current value of is_a_member variable.
6 0
4 years ago
Other questions:
  • Which model is the oldest and most common technique of differentiating information systems?
    8·2 answers
  • How can I get more Gems in the game {Fashion Empire} through a Fire kindle?
    15·2 answers
  • Whenever I try to plug in my code it will not work. I also need to add 4 more polygons and I don't know where.
    11·1 answer
  • Which pillar in the cisco iot system describes embedded networks that include compact form factor switch and router cards runnin
    5·1 answer
  • How do you view a presentation as your audience would see it?
    14·2 answers
  • Any part of the computer that you plug into the CPU like a phone, tablet, headphones etc. are called
    5·1 answer
  • How do you put a voice password on your computer using windows 10
    14·1 answer
  • William would like to sort a list of items after the data is already entered.
    5·1 answer
  • Write a program that defines an array of integers and a pointer to an integer. Make the pointer point to the beginning of the ar
    12·1 answer
  • True or false you can create a. network with 2 computers?<br>​
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!