1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
7nadin3 [17]
3 years ago
10

Mark brainliest

Computers and Technology
1 answer:
vaieri [72.5K]3 years ago
7 0
Boolean I think it’s a guess
You might be interested in
Why should data anaylst should learn about computer arichtecture.
torisob [31]
The knowledge serves as good foundation for me to understand how technology works behind the scene as well. So I must say a good understanding of computer architecture gives the data scientist the ability to propose feasible solution in capturing and maintaining data, implementing models and algorithms in IT systems.
8 0
3 years ago
The area where a blast originates is referred to what perimeter/isolation zone
Anna [14]
The area where a blast originate from is referred to as PERIMETER. After a bomb blast incident, the first responders has to map out a safe pre-blast perimeter based on the requirements of Bureau of Alcohol, Tobacco, Firearms and Explosives [BATFE]. After this, the first inner perimeter, also called hot zone must be established. This is where the blast originated from and it is the point where victims rescue and treatment will start.
8 0
3 years ago
Write a class Example() such that it has a method that gives the difference between the size of strings when the '-' (subtractio
Mariulka [41]

Answer:

class Example:

def __init__(self, val):

self.val = val

def __gt__(self, other):

return self.val > other.val

def __sub__(self,other):

return abs(len(self.val) - len(other.val))

def main():

obj1 = Example('this is a string')

obj2 = Example('this is another one')

print(obj1 > obj2)

print(obj1 - obj2)

main()

\color{red}\underline{Output:}

3 0
3 years ago
What should we do to prevent software piracy?
frozen [14]

Answer:

1. Read the End User License Agreement (EULA) for each software product you purchase.

2. Purchase CD software only from reputable resellers.

3. Purchase software downloads directly from the manufacturer's website.

4. Register your software to prevent others from attempting to install your software on their computers.

5. Report piracy if you discover that software you purchased is not authentic or if you suspect that an online reseller or retail establishment is selling counterfeit software.

Link: https://www.techwalla.com/articles/how-to-stop-software-piracy

-Please mark as brainliest!- Thanks!

7 0
3 years ago
Match the item to the type.
I am Lyosha [343]

Answer:

a. hardware - 3. motherboard

b. software - 2. Microsoft Word

c. input device - 4. mouse

d. operating system - 1. windows

7 0
3 years ago
Read 2 more answers
Other questions:
  • The Tell Me feature also includes access to the _____ feature.
    13·1 answer
  • Why is it important to know much time you spend on task
    8·1 answer
  • 1. Of which of the following is a box an example?
    10·2 answers
  • __________________ fonts use binary code to define each pixel of the letter to be displayed.
    8·1 answer
  • Which is a good guideline to follow when looking for research material on the Internet?
    10·2 answers
  • Create a winform application that lets the user enter a temperature. With a ComboBox object offer the user three choices for inp
    9·1 answer
  • what are examples of conditional formatting tools? check all that apply. color scales, icon sets,data bars,cell styles,themes
    8·1 answer
  • What is the best description of a raster image?
    10·1 answer
  • Different the need for external or secondary memory​
    12·1 answer
  • Explain four sitting postures in a computer laboratory​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!