1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Harrizon [31]
3 years ago
10

Write a function using statements called Print Reportl) which will take no float

Computers and Technology
1 answer:
Sedbober [7]3 years ago
5 0

Answer:

the answer is going to be district b

You might be interested in
On a chart created in excel, the horizontal axis is also called the ____.
Artyom0805 [142]
The chart<span> types created in Excel have two axes: a </span>horizontal axis  and a vertical axis. These charts are used to<span> illustrate the workbook data graphically in order to see trends.</span><span>
On a chart created in excel, the horizontal axis is also called the X axis. The vertical axis on the other hand is called Y axis.


</span>
3 0
3 years ago
Which of the statements below are true? Which are false?
yKpoI14uk [10]

Answer:

a. True

b. False

c. False

d. True

e. True

f. True

g. False

h. True

i. False

j. False

Explanation:

Polling is a technique in which users are connect externally and programs are run by synchronization activity. The users are allowed to set flags for devices which are periodically checked. The end user can implement system calls using the polling technique.

7 0
3 years ago
In the Remote Access Domain, if private data or confidential data is compromised remotely, you should set automatic blocking for
Alex787 [66]

Answer:

False

Explanation:

If your server has been hacked, accessed by Remote access domain, these are tips or recommendations:

- Disable the Remote Desktop service on the affected computer and close port 3389 on the router so that your server is not accessible by Remote Desktop from the Internet, as another hacker can re-access and encrypt more files or encrypt over those already encrypted. .

- Ensure that the virus is not active, to do this place some files to see if they are encrypted or not.

- Scan the server with an updated antivirus.

- Open Task Manager, view active processes, and end the encryption process, which is usually Payload.exe

- Change the passwords of all users of the computer.

- Install a good paid antivirus, we recommend these:

- Configure the antivirus with password protection, so hackers cannot uninstall or deactivate it.

- You can use a desktop blocking program such as Eusing Maze Lock.

- Use a network firewall and VPN connection to remotely access the computer.

- Never use direct connection by Remote Desktop without VPN.

- Set up an online backup or an appropriate backup policy.

6 0
3 years ago
What is the output of the following C++ code? int list[5] = {0, 5, 10, 15, 20}; int j; for (j = 0; j &lt; 5; j++) cout &lt;&lt;
sesenic [268]

Answer:

what?

Explanation:

8 0
3 years ago
1) SuperFetch is a memory-management technique that a) determines the type of RAM your system requires. b) makes the boot-up tim
Ira Lisetskai [31]

Answer:

c

Explanation:

It preloads the apps and softwares that you use most into thr memory so that they can boot up faster.But it consumes more ram.

5 0
3 years ago
Other questions:
  • Max needs to study more effectively to get a better grade on his next exam. What can he do to improve his study habits? Check al
    10·2 answers
  • Which of these protects against the most common attacks on the internet via a database of signatures, but at the same time actua
    9·1 answer
  • The integer variables first and last have been declared and assigned values (with last &gt;= first). Allocate an integer array t
    10·1 answer
  • Where is help on this system?
    7·2 answers
  • Why is the wizard able to install the printer when an actual print device is not connected to the computer??
    11·1 answer
  • How many Pokemon have only one type? In other words, for how many Pokemon is Type2 blank?
    6·1 answer
  • In the 1800s, the Know-Nothing Party worked to accomplish which of the following?
    7·1 answer
  • If a touch screen chrome is not charging what is wrong with it
    13·2 answers
  • select the correct answer from each drop-down menu. “To clean a computer screen, use ___. To clean a keyboard, use a ___.”
    7·1 answer
  • <img src="https://tex.z-dn.net/?f=4%2C000%201%20tenth" id="TexFormula1" title="4,000 1 tenth" alt="4,000 1 tenth" align="absmidd
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!