1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hichkok12 [17]
4 years ago
12

Breaking code rules is only a problem once in a while. Group of answer choices True False

Computers and Technology
1 answer:
seropon [69]4 years ago
4 0

Answer:

false because you could get into a lot of trouble.

Explanation:

You might be interested in
1) These are operators that add and subtract one from their operands. A) plus and minusB) ++ and --C) binary and unaryD) conditi
GREYUIT [131]

Answer:

1) B: ++ and --

2) B: 111... and on forever

Explanation:

++ and -- in most programming languages are used for incrementing(adding) by 1 or decrementing(substracting) by 1.

The code will output 111... and on forever because the while loop was not covered in curly braces.

5 0
3 years ago
Select the correct answer.
hammer [34]

Answer:

B :)

Explanation:

C and D could work, but B is the most logical.

Hope it helps! :)

If I'm right, I would really appreciate it if you could vote me as the Brainliest answer. Thank you!

7 0
3 years ago
Read 2 more answers
Please help i only have 20 minuets
Ann [662]

Answer:

Newton's first law states that an object will stay at rest or be in motion, unless an unbalanced force acts on it.

7 0
3 years ago
To write a letter using Word Online, which document layout should you choose? ASAP PLZ!
madreJ [45]

Traditional... See image below

8 0
4 years ago
Alice sends a message to Bob in a manner such that Bob is the only person who can tell what the real message is. Which security
cupoosta [38]

Answer:

confidentiality

Explanation:

Alice sends a message to Bob in a manner such that Bob is the only person who can tell what the real message is. Which security concept is this an example of

3 0
3 years ago
Other questions:
  • Write the definition of the word "log" as it would be used in relation to digital literacy
    13·1 answer
  • Explain at least one reason why programming languages have functions
    12·1 answer
  • Select the correct statement(s) regarding CENTREX. a. CENTREX systems reside at the service providers central office, however, t
    11·1 answer
  • HW3_P1 - Student list using array
    7·1 answer
  • Surprisingly, many of us may be unknowing victims of botnets. Because of the rising sophistication of botnet schemes, your compu
    14·1 answer
  • If you have created a document that contains a table that is 10 inches wide and 4 inches high, you will want to print the docume
    6·2 answers
  • What kind of power does Tesla Model S, 3 X, and Y use?
    8·2 answers
  • Which two functions can be used with the math module?
    13·1 answer
  • Advantages of python programming language
    10·1 answer
  • A search engine finds bugs and system failures in your computer.<br><br> True or False?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!