1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Semenov [28]
3 years ago
12

Consider the following code:

Computers and Technology
1 answer:
ICE Princess25 [194]3 years ago
4 0

Answer: 3

Explanation:

Because X = 18 and our condition given to the code if > and < which do not match with the input so it prints 3.

You might be interested in
Visual-verbal synergy has nothing to do with text, but solely with images used in a design.
Ilia_Sergeevich [38]
I think it is true (A) 
3 0
3 years ago
Convert the following as indicated : (120)10 = (?)2​
Nookie1986 [14]

Answer:

1111000

Explanation:

perform the following. write from right to left:

- is the number even? then write down a 0

- is the number odd? then write down a 1 and subtract 1

- divide by 2

- repeat until you reach 0.

So for 120:

120 is even, so write down a 0 and continue with 120/2=60

60 is even,  so write down a 0 and continue with 60/2=30

30 is even,  so write down a 0 and continue with 30/2=15

15 is odd,  so write down a 1 and continue with 14/2=7

7 is odd, so write down a 1 and continue with 6/2=3

3 is odd, so write down a 1 and continue with 2/2=1

1 is odd, so write down a 1 and finish with 0

4 0
2 years ago
List and briefly describe passive and active security attacks.
Rama09 [41]

Answer:

Passive security attack are the unauthorized disclosure in the network attack. In this type of security attack a system are use for monitoring and sometimes scanning the open port. It basically include the monitoring the unprotected data and traffic analysis.

On the other hand, active security system modify the transmitted data and gain the unauthorized access from the computer system.

This type of security attack basically monitor the file transfer and electronic mail from the attacks which can be pass in the form of viruses in the computer system.

4 0
3 years ago
Identify way in which computer are used in personnel management
Lyrx [107]

The main roles of computer in human resource management are decreasing time complexity, flexibility, record keeping problem etc. HRM system process lots of data everyday with the help of computer. This data processed easily without any fear of data loss so computer a vital role in human resource management system. The usage of computer in human resource management can be usually referred to as management information system. It can also be called as human resource information system. Usually what a computer does, it converts all the data or we can say raw data into meaningful and usable information required by the manager to take decisions, and for planning and control.

please I need brainliest thanks

I hope this helps

4 0
3 years ago
Read 2 more answers
Do yall play games..............................................................................................................
polet [3.4K]

Answer:

hell yeah boi. ...................................

7 0
3 years ago
Read 2 more answers
Other questions:
  • A bit shift is a procedure whereby the bits in a bit string are moved to the left or to the right. For example, we can shift the
    12·1 answer
  • Which type of message format is designed to arouse curiosity, not showing the product or delivering quite enough information to
    10·1 answer
  • You recently upgraded your computer and added an extra 512 MB of RAM. Consequently, you want to increase your swap space by addi
    10·1 answer
  • Explain word processing ​
    11·2 answers
  • When considering changing the content of a cell which button should you press to leave the cell as it originally was? 
    5·1 answer
  • Give an example of a situation in which a compromise of Confidentiality leads to compromise in Integrity.Situation where confide
    8·1 answer
  • Can anyone fill in the space please
    6·1 answer
  • You make an online purchase of a hooded sweatshirt with the logo of the Dallas Cowboys. The next time you log on, your screen ha
    13·1 answer
  • Write a Java statement to create an object LG of class TvSets
    11·1 answer
  • 7. A(n) is the address of a document or other file accessible on the Internet.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!