1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vladimir2022 [97]
3 years ago
11

Can you please provide sample rexx code?

Computers and Technology
1 answer:
Aleks04 [339]3 years ago
7 0

Answer:

/*  My first REXX program  */

say 'Hello world'

Explanation:

REXX is an OS/2 scripting language.

You might be interested in
If the following are using default subnet masks, which one(s) of the following are valid node ip addresses: (select one) a) 220.
Svetach [21]

If the following are using default subnet masks, the option that are valid node ip addresses is option b) 10.10.0.10.

<h3>What does 10. 10 0. 1 mean?</h3>

10.254 and 10.10. 0.1 is known to be a node that are said to be part of the same network.

Note that the  first address of any network is seen as the the "network ID" address of the said network. So, if you are known to be using a kind of 24 networks, one of the real available networks is one that originate from 10.0.

Therefore, If the following are using default subnet masks, the option that are valid node ip addresses is option b) 10.10.0.10.

Learn more about subnet masks from

brainly.com/question/27960959

#SPJ1

5 0
2 years ago
someone please tell me if you watch drag race (rupauls drag race) I need someone to talk to about it ​
lys-0071 [83]
I’m gonna watch it soon
3 0
3 years ago
Which of the following does not describe local alignment algorithm?
swat32

Answer:

The answer is "Option a".

Explanation:

A score can be detrimental. When an element has a score below zero, it means, that the sequences up to this point have no correlations, that are set to zero and its effects the previous alignment is excluded. Thus, alignment can be further found in every position later in the calculation. and other options are incorrect that can be described as follows:

  • In option b, In this option the score can be negative, that's why we can't set its value.
  • In option c, The first row and column must contain some value it can't be 0, that's why it is not correct.
  • In option d, It will start with a lower score and ends with a higher score, that's why it is not correct.

8 0
3 years ago
Im building my first gaming pc, got any part suggestions or tips?
ladessa [460]

Answer:

You should find a good game engine that is not hard. Unity and Unreal are some good ones.

You should also search for the programming language you like the most, and use engines that use that specific language.

5 0
3 years ago
Read 2 more answers
Address whether each defense method listed above (single router, defense-in-depth, and demilitarized zone) is sufficiently diffe
bagirrra123 [75]

Answer:

Check the explanation

Explanation:

1) The single router approach is a security Implementation of all security policies and the defense-in depth approach employs a firewall. the DMZ approach Is establish between two routers with a firewall.

2) The single router approach is for small offices and homes.

The defense in depth approach is for large organizations.

The DMZ approach is for publicity operated networks.

3) The DMZ can provide better defense because it has more than two firewall for increased security.

5 0
4 years ago
Other questions:
  • Marie can now edit her photos, send them in emails, print them on a printer, and use them as wallpaper on her computer. This is
    9·2 answers
  • your grandmother tells you a dollar doesn’t go as far as it used to. She says the “purchasing power” of a dollar is much less th
    6·1 answer
  • A switch is closed, and a lamp turns on.The switch is opened, the lamp turns off. eXplain what is meant by these two statements.
    10·1 answer
  • SHOW ALL YOUR WORK. REMEMBER THAT PROGRAM SEGMENTS ARE TO BE WRITTEN IN JAVA. Assume that the classes listed in the Java Quick R
    9·1 answer
  • The column boundary, the border to the right of a column, can be dragged until a row is at a desired height. true or false
    14·1 answer
  • Which of the following protocols help IP in multicast service?
    9·2 answers
  • Which footing supports a long brick or concrete wall<br>​
    14·1 answer
  • Function of Ribbon in Access 2010​
    7·1 answer
  • Which genre of art is specific to digital media?
    8·1 answer
  • An Inspect and Adapt (I&amp;A) event is occurring and a program is trying to address a long-existing problem (WIP)?"unreliable P
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!