1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
galben [10]
3 years ago
6

Rapunzel s-a născut într-un ţinut îndepărtat într-un regat necunoscut. Mama vitregă a închis-o pe Rapunzel într-un turn foarte î

nalt ce avea N metri. Aici Rapunzel urma să-şi petreacă toată copilăria. Pentru a-i trece timpul mai uşor, Rapunzel cânta din zori şi până în seară, cântecul ei auzindu-se în tot ţinutul. Atras de vocea de privighetoare a fetei, Flynn Rider şi-a propus să se caţere pe pereţii exterior ai turnului şi în fiecare zi să procedeze astfel: de la răsăritul până la asfinţitul soarelui să parcurgă M1 metri iar apoi, de la asfinţit până la miezul nopţii încă M2 metri. Scrieţi un program care determină după câte zile ajunge Flynn Rider la Rapunzel.
Computers and Technology
1 answer:
andrey2020 [161]3 years ago
5 0
Iche hebie zaft no guts dude
You might be interested in
Which is true of effective passwords?
mylen [45]

Answer:

It is either A. or D.

4 0
3 years ago
Will give brainliest to whoever can answer all of these questions correctly.
babymother [125]

false

ppt

chips designed to preform a function

Apologize to the customer for the inconvenience and offer to refund his money or replace the item

OneDrive-CollegeWork-FreshmanYear-NameOfClass

true

Social networking

paragraph

true

complete fill

true


 

7 0
4 years ago
Read 2 more answers
The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption, but can be
coldgirl [10]

Answer:

The answer is "timing".

Explanation:

  • The time attack would be a security vulnerability that enables attackers that identify computer systems or network security issues by analyzing the period of the program's reaction to multiple levels.  
  • It is used in both RSA encryption and decryption of the modular exponentiation method but could be modified for just about any system not seem running in a fixed period.
6 0
3 years ago
Game Design Help please
valina [46]
This game on cool math
4 0
4 years ago
Spacing and punctuation for mailing labels is determined by spacing and punctuation inserted in the ____ box.
IRISSAK [1]
Your answer to this question is..
that it is inserted in the Prototype Label box..
I am 100% sure.. good luck !
Bye and Take Care

6 0
4 years ago
Other questions:
  • List the five ethical rules that you feel are most important for one to follow when using the internet.
    6·1 answer
  • A _________ is a copy of one or more files (or entire storage devices) that is made in case the originals become lost or damaged
    5·1 answer
  • Zola is very skilled with Microsoft and Apple, and she knows different methods of programming. This knowledge will help make Zol
    10·2 answers
  • In general, font size for software-generated presentation slides should be no smaller than __________ points.
    8·1 answer
  • Should I download RAM on my computer?
    11·2 answers
  • What is the gauge manifold made of
    14·1 answer
  • True or False <br><br> Rootkits are only made by black-hat hackers.
    8·1 answer
  • When should you create an outline?
    11·1 answer
  • You can't cite Wikipedia, what are three ways that you can use it for your research?
    5·1 answer
  • In addition to the cost of legal services and the cost of treatment, which of the following are considered direct costs for work
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!