1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Serhud [2]
2 years ago
11

To inspire unit 1 App

Computers and Technology
1 answer:
Tasya [4]2 years ago
5 0
Is there more to this or ?
You might be interested in
In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will
Tresset [83]
Answer: star

Explanation: A star network topology is an implementation of a spoke–hub distribution paradigm in computer networks. In a star network, every host is connected to a central hub. In its simplest form, one central hub acts as a conduit to transmit messages. The star network is one of the most common computer network topologies.
5 0
2 years ago
write a function that takes two integer arrays as input return true if any two of the numbers in the first array input add up to
Afina-wow [57]

Answer:

Explanation:

This program is written in Python. It is a function that takes in two arrays. Then it loops through the first array twice, adding each element with the others and comparing the sum to the values in the second array. If a similar value is found in the second array, the program prints out the value and returns True to the user. Otherwise, it returns False. A test case has been created with two array variables that print out False, the output can be seen in the attached image below.

def sumArray(arr1, arr2):

   for i in range(len(arr1)):

       for x in range(len(arr1)):

           sum = 0

           if i != x:

               sum = arr1[i] + arr1[x]

           if sum in arr2:

               print(str(sum) + "Found in Second Array")

               return True

   return False

arr1 = [1, 9, 10, 44]

arr2 = [2, 4, 8, 14]

print(sumArray(arr1, arr2))

8 0
3 years ago
The _____ _____ form of database attack injects code into user login information with one or more statements that perform action
amid [387]

Answer:

The answer is cross-site scripting(XSS)attack.

Explanation:

Hope this helps!

5 0
2 years ago
associate true with the variable has_dups if the list list1 has any duplicate elements (that is if any element appears more than
nordsb [41]

True. If the list contains any elements that appear more than once, then it has duplicate elements and the variable has_dups is True.

What is variable?
Throughout computer programming, a variable is indeed a named container for a specific set of bits or type of data. A variable is indeed an abstract storage location with an associated symbolic name that holds some unidentified quantity of information made reference to as a value. Eventually, a memory address may be used to link or identify a variable. In addition to using the variable name or the variable itself, depending on circumstances, the stored value is typically referenced by the variable name. The name can be used independently of the precise information it represents thanks to the separation of name as well as content. During run time, a value can be bound to an identification number in computer source code.

To learn more about variable
brainly.com/question/29360094
#SPJ1

7 0
9 months ago
Communication is used to satisfy instrumental goals, which means ________ .
Ann [662]
Communication comes in lots of types, therefore, it also has lots of goals and purposes. One of the purpose of communication is to satisfy instrument goals. Instrument goals here refers to the goal that focuses on convincing others to act in an appropriate way. This is most applicable in situations when someone had to deal with others. 
3 0
3 years ago
Read 2 more answers
Other questions:
  • Henry bought a new card for capturing television on his computer. When he finished going through the packaging, though, he found
    5·1 answer
  • Does anybody know if that apple watch is actually worth what it costs?
    9·2 answers
  • Besides the Computer Inventory and Maintenance form, what other documentation should you keep on each computer? How might you st
    8·1 answer
  • What language must be used to display a bare-minimum webpage?
    8·2 answers
  • Suppose that the instruction format for a modified Little Man Computer requires two consecutive locations for each instruction.
    5·1 answer
  • A label control may be added to a form by double-clicking on the Label control icon in the ________ window.
    15·1 answer
  • We have constructed a Player Class for you. Add the following: public static variable: int totalPlayers Static variable should b
    8·1 answer
  • Under the Home tab, controls for aligning text and objects can be found in the
    5·2 answers
  • Identify the network and the host address in the ip address of 12.128.120.131 with a subnet mask of 255.128.0.0.
    6·1 answer
  • Enabling encryption of all data on a desktop or laptop computer is generally considered:______.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!