1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Musya8 [376]
3 years ago
8

FREE 100 POINTS + FIRTS AWNSER = BRAINIST

Computers and Technology
2 answers:
r-ruslan [8.4K]3 years ago
7 0

Thank you!

Have a great day!

Hatshy [7]3 years ago
3 0

Answer:

wow thanks!

Explanation:

i really needing something to be happy about

You might be interested in
How can I code this in Python with only if-statements? (Only allowed to use the built-in functions int(), float(), and str().)
yan [13]

str)float)sorry dont know

5 0
3 years ago
a central issue in the microsoft antitrust lawsuit involved microsoft's integration of its internet browser into its windows ope
Tomtit [17]

A central issue in the Microsoft antitrust lawsuit involved Microsoft's integration of its internet browser into its windows operating system, to be sold as one unit is a practice that is known as: C. tying.

<h3>What is an operating system?</h3>

In Computer technology, an operating system (OS) can be defined as a system software that's usually pre-installed on a computing device by the manufacturers, in order to manage random access memory (RAM), software programs, computer hardware and all user processes.

Microsoft was involved in an antitrust lawsuit with respect to tying the integration of its internet (web) browser into its windows operating system (OS) such as Windows 7, 8, 10, etc., in order to sell them to end users as a single unit.

Read more on operating system here: brainly.com/question/22811693

#SPJ1

8 0
10 months ago
Write statementsto show how finding the length of a character array char [ ] differs from finding the length of a String object
NARA [144]

Answer:

Length of char array: sizeof(arr)

Length of a string object: myString.length()

Explanation:

The sizeof approach is generally not recommended, since this information is lost as soon as you pass the array to a function, because then it becomes a pointer to the first element.

4 0
3 years ago
What makes the huns a formidable force for the roman empire?
Maurinko [17]
<span>The Huns were a formidable force to fight. They were able to eat most food without problem which removes the needs for supply trains and such and encourages pillaging. Another reason is that their a cavalry based army which completely decimated roman military since the roman empire consist of flat land and they could outflank, outrun, and could whittle down an army with ease. They also are nomads which means you don't know where they're living and so you can't be on the attack which also gave an advantage. This points that the Huns are a force to be reckon with.</span>
7 0
3 years ago
Space cushion includes
Ulleksa [173]

Answer:

D. sides

Explanation:

Space cushion includes sides of your vehicle.

8 0
2 years ago
Read 2 more answers
Other questions:
  • 7.
    6·1 answer
  • What is the next series of dragon ball super
    6·2 answers
  • _____ is defined as an attraction for a source based on a resemblance between the source and receiver of a message.
    15·1 answer
  • If your problem is caused by a bad hardware or software installation and you get an error message the first time you restart the
    6·1 answer
  • When you _____ a scroll bar, a shortcut menu appears with commands related to the scroll bar
    10·1 answer
  • A ______________ is a way of taking a screenshot or a picture of your computer screen. ​
    14·1 answer
  • which statement is true? O A Future games will be more context oriented. OB. Future games will be more product driven. Future ga
    13·2 answers
  • The East Coast sales division of a company generates 62 percent of total sales. Based on that percentage, write a Python program
    7·1 answer
  • What dog breed is this
    6·1 answer
  • The most serious security threat to Bluetooth-enabled devices is ____, which occurs when a hacker gains access to the device and
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!