1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
professor190 [17]
3 years ago
15

Guess The Song: What Popping Brand New Whip Just Hopped In, I Got options

Computers and Technology
1 answer:
Georgia [21]3 years ago
7 0

Answer:

its called whats poppin lol

Explanation:

:)

You might be interested in
Which function can you use to abbreviate the lengthy expression, A1+A2+A3+A3...+A19+A20?  MAX COUNT SUM ROUND
Naddika [18.5K]
Which function can you use to abbreviate the lengthy expression, A1+A2+A3+A3...+A19+A20? SUM
6 0
4 years ago
Read 2 more answers
A company creates a ______by using a wireless access point (WAP) and an Internet connection. Select the two correct answers, the
lesya [120]

t should be noted that by using a wireless access point (WAP) and an Internet connection a company can  creates;

  • wireless LAN
  • wifi.

<h3>What are wireless access point (WAP) ?</h3>

This is a computer system that allows the connection without a cable, it uses wireless connection.

wireless LAN and wifi serves as a medium for connection among computers without any cables.

Learn more about wireles at;

brainly.com/question/15665656

7 0
3 years ago
Gina works in an SDLC team. When Gina makes changes to a file, no one else is allowed to acess it. Which type of version control
Dmitry [639]

Answer:

A. file locking.

Explanation:

File locking in computer technology is a data management mechanism used by software developers to completely restrict access of other users to a software program or computer file by granting permissions to only one user who can delete, modify or edit the application program at any point in time. This simply means that in the software development life cycle (SDLC), file locking is used to avoid interceding update on a particular software by restriction of other users while it's being modified by another user.

For instance, if two users (Gina and Mike) open the same software program, Gina then proceed to modify and save the changes. If Mike also modifies the software program and saves it, this would overwrite Gina's update. Hence, in order to prevent this type of conflict in software development, it is highly recommended that a file locking mechanism is adopted.

<em>This ultimately implies that when Gina make changes to a file, no one else is allowed to access the file because a file locking mechanism is being used by Gina's company as a version control process. </em>

8 0
4 years ago
What part of a waveform describes a sound's loudness?
torisob [31]

Answer:

B i believe

Explanation:

3 0
4 years ago
Read 2 more answers
Write a Dice Game program that generates two random dice values between 1 and 6 for you, and 2 for the computer. You get to roll
charle [14.2K]

Answer:

#include <iostream>

#include <time.h>

#include <string>

using namespace std;

int main(){

srand(time(NULL));

cout<<"Throw dice"<<endl;

int b =0;

int a=0;

a=rand()%6;

b=rand()%6;

for (int i =0;i<1;i++)

{cout<<"dice one: "<<a<<endl;}

for (int i =0;i<1;i++)

{cout<<"dice two: "<<b<<endl;}

if(a>b)

{cout<<"first dice won"<<endl;}

if(b>a)

{cout<<"second dice won"<<endl;}

else{cout<<"they are same"<<endl;

return main();

}

return 0;

}

Explanation:

/*maybe it help you it is almost done*/

6 0
3 years ago
Other questions:
  • How many references should you have ready to list if an employer asks for them? a. 1-3
    13·1 answer
  • In order for Dr. Reynolds to send a CPOE from her office computer system to the computer system at the local hospital, a/an ____
    5·1 answer
  • A website that allows anyone with access to add new material and edit existing materials is referred to as a​ _________. A. data
    9·2 answers
  • What technology habit you practice every day that you need to stop to be more successful?
    13·1 answer
  • An ordinary office environment needs computers that have multiple user account settings where each user is allocated private dat
    13·1 answer
  • Encryption is the key to keeping your personal information secure online.<br><br> True<br><br> False
    11·1 answer
  • How many miss Dragon Ball Abridged?
    5·2 answers
  • Using a custom animation effect, how do you make text appear on a slide letter by letter?
    9·1 answer
  • 2 4.1.2 Quiz: Information Systems and Business Planning
    11·1 answer
  • I need help 40 points and brainless
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!