1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
faltersainse [42]
2 years ago
11

Can someone please help with this thanks luvs c

Computers and Technology
1 answer:
aivan3 [116]2 years ago
8 0

Answer:

HELLO, be nice spread love... DO NOT HATE ON OTHERS

░░░░░▐▀█▀▌░░░░▀█▄░░░

░░░░░▐█▄█▌░░░░░░▀█▄░░

░░░░░░▀▄▀░░░▄▄▄▄▄▀▀░░

░░░░▄▄▄██▀▀▀▀░░░░░░

░░░█▀▄▄▄█░▀▀░░

░░░▌░▄▄▄▐▌▀▀▀░░ This is Bob

▄░▐░░░▄▄░█░▀▀ ░░

▀█▌░░░▄░▀█▀░▀ ░░ Copy and paste him so he can take over brainly.

░░░░░░░▀███▀█░▄░░

░░░░░░▐▌▀▄▀▄▀▐▄░░

░░░░░░▐▀░░░░░░▐▌░░

░░░░░░█░░░░░░░░█░

COPY AND PASTE LETS DEFEAT BRAINLY

Explanation:

You might be interested in
TCP and the User Datagram Protocol (UDP) provide _________ between processes on any two of those hosts. A. address translation B
Fynjy0 [20]

TCP is known to be a type of a connection-oriented protocol, while UDP is a connectionless protocol. TCP and UDP provide data transport between hosts.

  • TCP and UDP are known for their speed, as TCP is slower and can retransmit lost data packets than UDP. UDP is said to be faster, simpler, and efficient protocol.

Data transport is simply known to be an the energy problem. It is the amount of energy needed to transport a bit from the closest neighbor.

Data Transport Service gives  a reliable connection for moving large amounts of data at very fast speeds.

Learn more from

brainly.com/question/17695822

6 0
3 years ago
What will be the output after the following code is executed? def pass_it(x, y): z = y**x return(z) num1 = 3 num2 = 4 answer = p
bearhunter [10]

Answer:

"64" is the output of the above code.

Explanation:

  • The function holds the expression with (**) operator which is used to calculate the power in python language.
  • So if we write 2**4, then this will give 16 as output. It is because when we calculate the 2^{4}, then it will become 16.
  • The above question passes the num1 and num2 value in the function as an argument which is 3 and 4.
  • So 3 will be initialized for x variable and 4 is for y variable.
  • So when we calculate y^{x} then it will become 4^{3} which will become 16.
  • So 64 is the output for the above question.
3 0
3 years ago
Tech A says that gasoline vapors are lighter than air, so inspection pits do not have a fire hazard like above ground hoists. Te
Elden [556K]

Answer:

Tech B is correct.

Explanation:

First, It is international best practice never to exceed the lifting capacity of any hoist. To do so would expose those involved to risks that may prove to be fatal.

Second, research has shown that gasoline vapors, as well as vapor from almost all other flammable or ignitable liquids or substances, are heavier than air.

More specifically, Gasoline produces flammable vapors that are heavier than air by 3 to 4 times. This means they can travel for great distances along the ground. Worst still, inspection pits are must be kept free from gas vapors because they tend to accumulate in low or enclosed spaces.

Both technicians should and must observe all occupational, health, and safety rules and guidelines stipulated and required for their industry/practice.

Cheers

4 0
3 years ago
Write a programme to find the sum of first three cube number?
aleksandrvk [35]

// Simple Java program to find sum of series

// with cubes of first n natural numbers

import java.util.*;

import java.lang.*;

class GFG {

/* Returns the sum of series */

public static int sumOfSeries(int n)

{

int sum = 0;

for (int x = 1; x <= n; x++)

sum += x * x * x;

return sum;

}

// Driver Function

public static void main(String[] args)

{

int n = 5;

System.out.println(sumOfSeries(n));

}

}

// Code Contributed by Mohit Gupta_OMG <(0_o)>

7 0
3 years ago
Two-factor authentication can best be breached by the adversary using:________. a. social engineering attack b. using sniffers l
tiny-mole [99]

Answer:

a. social engineering attack

Explanation:

Two-factor authentication requires that the user/owner of the account enter a second verification code alongside their password in order to access the account. This code is usually sent to a personal phone number or email address. Therefore in order to breach such a security measure the best options is a social engineering attack. These are attacks that are accomplished through human interactions, using psychological manipulation in order to trick the victim into making a mistake or giving away that private information such as the verification code or access to the private email.

6 0
3 years ago
Other questions:
  • The _________ specifies the station(s) for which the frame is intended. it may be a unique physical address, a group address, or
    5·1 answer
  • ____ indicates the number of pixels that a computer uses to display the letters, numbers, graphics, and background on a screen.
    12·2 answers
  • How to revert a dismissed javascript popup alert box in chrome?
    5·1 answer
  • (Complete the Problem-Solving discussion in Word for Programming Challenge 2 on page 404. Your Problem-Solving discussion should
    13·1 answer
  • ____ devices are high-performance storage systems that are connected individually to a network to provide storage for the comput
    12·1 answer
  • Relation between training and occupation with examples in points . Plz tell fast<br> ​
    5·1 answer
  • Learning Task 3: Write the safety requirement indicated in each number on a
    15·1 answer
  • Website designers work on the code and programming of a website, not the style or layout of the site.
    9·1 answer
  • Which important aspect of the Roman Empire did the barbarians destroy?
    14·2 answers
  • Which of the expressions is false? when a = 10 and b = 4
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!