1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
omeli [17]
3 years ago
15

Why do people enjoy codehs

Computers and Technology
1 answer:
Alex73 [517]3 years ago
6 0

Answer: this is a moral question, but here is my view

Explanation:

we get to learn about things like java which i am currently learning for AP computer science A

You might be interested in
A(n) _______________ is a collection of configuration and security settings that an administrator has created in order to apply
ioda

Answer:

Profile

Explanation:

<em>A </em><em>profile </em><em>is a collection of configuration and security settings that an administrator has created in order to apply those settings to particular categories of users or devices. </em>

Profile Security Requirements are very important in order to define the levels of protection. Every particular profile counts on its predefined rules. Such set of rules either allow or deny in order to having access to the computer and the type of access to be granted to the user profile in the computer.

6 0
3 years ago
What are the 3 dimension of an information system?
Ne4ueva [31]

Answer:

There are three dimensions of information systems ; organizational, management, and technology. Senior management always make decisions, so senior management is required to understand these three dimensions to make better decisions of the business through information systems.

3 0
2 years ago
Counter-controlled repetition is also known as:
const2013 [10]

Answer:

a) definite repetition

Explanation:

The counter-controlled repetitions is one in which we know the number of times a loop will be followed or performed.

Definite repetition is the one in which we know the number of iterations to be performed by a loop before the execution of the loop.  

For Example:  

Repeat a loop for 25 times printing out b *.

3 0
3 years ago
COMO HA SIDO LA INNOVACION DE ESTE OBJETO TECNOLOGICO DURANTE SU EVOLUCIÓN
Marizza181 [45]

Answer:

Cual es el objeto tecnologico?

Explanation:

Si dices Cual,puede ser que te ayude.

3 0
3 years ago
Many people object to increased cybersecurity because _____.
yawa3891 [41]
Depending on what kind of security measures are implemented, D would definitely be a contender. However, B is also something to take into consideration. I would answer D.<span />
5 0
3 years ago
Read 2 more answers
Other questions:
  • In this type of network, data is certain to reach its destination.
    7·1 answer
  • The numbers on the bottom of a typical check represent all of the following EXCEPT?
    12·2 answers
  • This was not a "true" operating system, but rather an operating environment.
    5·1 answer
  • A ____ is a text document written in HTML.
    13·1 answer
  • Which type of computer operating system would be best for a large corporation?
    7·2 answers
  • PLEASE HELP FAST !!!!!!!!!!
    12·1 answer
  • In a meeting, Juan hears someone say a product mix is "wide." What does
    13·1 answer
  • I need to reverse a inputted word using for loops with range 0 to the input word and increment 1.
    5·1 answer
  • Computer science - algorithms - flowcharts
    11·1 answer
  • for a given array of integers perform operations on the array return the resulting array after all operations have been applied
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!