1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stels [109]
3 years ago
13

Write a program to generate following series in qbasics 100,81,64,....1​

Computers and Technology
1 answer:
alexdok [17]3 years ago
8 0

Answer:

9 \times 9  = 81 \\ 8 \times 8 = 64 \\ 7 \times 7 = 49 \\ 6 \times 6 = 36

it's square root number you multiple times by 2

You might be interested in
What is the name of the unique identifier assigned to any personal computer that is connected to the internet?
Stolb23 [73]
There is no truly unique identifier assigned to a PC. Any appearance of a unique ID is merely an illusion. The closest thing there is to a unique identifier is a MAC address, which is actually assigned to a network adapter (Ethernet port, wireless radio, etc.) and is usually unique but can be faked
7 0
3 years ago
Lisa managed incident response for a bank. The bank has a website that’s been attacked. The attacker utilized the login screen,
Afina-wow [57]

Answer:

The attack is known as SQI Injection attack.

Explanation:

SQI injection usually exploit some security lapse in an application software for it to be able to work. It usually attack websites and mostly known as attack vector but may equally attack any type of SQL database of a company. These attacks allow attackers to steal and use identity, tamper with existing data on a system or website of the company or allow the complete disclosure of all data on the system. SQL Injection can also destroy the data or make it otherwise unavailable. Most importantly, it can become administrators of the database server or even cause reconciliation issues for such company transactions (e.g banks) such as voiding transactions or changing balances.

7 0
4 years ago
It is very difficult to enter the stock and microstock photography area. True False
podryga [215]

Answer:

False.

It is not very difficult to enter the stock and microstock photography area.

Explanation:

  • Micro stock photography is the term given to the the photo industry with royalty free or very low priced photographs.
  • After you get accepted in the industry you can easily start sharing your photographs in the stock photography field.
  • You can send your sample on the stock photography websites like, Shutterstock.
  • Overall if you have that skill and passion, it is not that hard job to become a stock photographer.
5 0
4 years ago
PLEASE help me i dont get this at all
zepelin [54]

Answer:

dont know dont really care

Explanation:

6 0
3 years ago
Read 2 more answers
Explain one way in which programmers may get hired.
ryzh [129]

Explanation:

I think you first get interviewed?

Then you get like a test and then have to explain it to the admission people on a whiteboard or something.

8 0
3 years ago
Other questions:
  • Jason, Samantha, Ravi, Sheila, and Ankit are preparing for an upcoming marathon. Each day of the week, they run a certain number
    7·1 answer
  • Password cracking is a technique used to extract user’s password of application/files without the knowledge of the legitimate us
    11·1 answer
  • When you see a yield sign what do you do?
    8·1 answer
  • Example 4-1: The styles for the main content of an HTML document main { clear: left; } main h1 { font-size: 170%; } main h2 { fo
    13·1 answer
  • Taking a picture with a wide aperture creates a shallow depth of field. The subject is up close and in focus and defined while b
    12·2 answers
  • I still haven't figured out how to award someone branliest will someone help me? If you explain to me how to do it i will do awa
    14·1 answer
  • In this line of code, what does 144 refer to?
    12·1 answer
  • A firm uses BitLocker for volume encryption. Normally, BitLocker performs its task well. However, an administrator was recently
    6·1 answer
  • What is stored in studentScores after running the program code?
    5·1 answer
  • A security event popped up, alerting security of a suspicious user gaining access to, and copying files from, the %systemroot%\n
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!