1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
S_A_V [24]
3 years ago
6

The following program is run. Then the user clicks the "bottomButton" TWO TIMES. What will be displayed in the console?

Computers and Technology
2 answers:
IrinaK [193]3 years ago
8 0

Answer:

A. aaa

bbb

ccc

ccc

ddd

B. bbb

ddd

ccc

ccc

C. bbb

ddd

aaa

aaa

D. bbb

ccc

ccc

ddd

Licemer1 [7]3 years ago
3 0

Answer:

d or b

Explanation:

its obviously not a or c because they don't have a single "ccc" in them

You might be interested in
Investigate the many ways that hardware and software can cause an interrupt to occur. Are ALL interrupts treated equally or do s
slavikrds [6]

Answer:

Following are the responses to the given question:  

Explanation:

This list is based mostly on the processor. Then you'll be ordered. An interrupt of a particular cable (wire) is produced for PC-ish CPUs (IRQ 0 - 31 for some intel processors). The bigger challenge is a lower number.

Strange factors have included a system clock, power business, 0, some reserved for use by CPU testing, serial/parallel/... ports and also some terminated/error/state/new devices requests device Thus a key touch on the keyboards could create an interrupt that was direct on old devices.

3 0
2 years ago
A hacker successfully modified the sale price of items purchased through your company's web site. During the investigation that
Korvikt [17]

Answer:

By modifying the hidden form values that is in a local copy of the company web page

Explanation:

In a situation were the hacker successful change the price of the items he/she purchased through the web site of the company's in which the company web server as well as the company Oracle database were not compromised directly which means that the most likely method in which the attacker used to modified the sale price of the items he/she purchased was by modifying the HIDDEN FORM VALUE that was in the local copy of the company web page making it easy for the HIDDEN FORM VALUE to be vulnerable to the hacker because the hidden form value did not store the company server side information or data but only store the company software state information which is why HIDDEN FORM VALUE should not be trusted.

5 0
3 years ago
When sharing a file or folder with someone not in your __________ , you need to input the __________ of the recipient.
Ede4ka [16]
Group, name is the answer
6 0
4 years ago
Read 2 more answers
Arrange the steps for conflict resolution in proper sequence.
VashaNatasha [74]

1.Clarify what the disagreement is

2. Establish a common goal for both parties

3. Discuss ways to meet the common goal 

4. Determine the barriers to the common goal

5. Agree on the best way to resolve the conflict

6. Acknowledge the agreed upon solution and determine the responsibilities each part has in the resolution 

8 0
3 years ago
Read 2 more answers
What is the easiest way to tame a dire wolf on Ark Survival Evolved?
Usimov [2.4K]

Answer:

Direwolves are large pack animals. ... Being carnivorous pack animals, Direwolves will likely attack on sight, so caution is advised. However, they do have the capability of being tamed, and are extremely loyal mounts once they are.

Explanation:

Taming and Feeding

You can tame a wolf by right clicking it with bones, and it could take anywhere from 1 to 6 bones. Black particles will appear each time you feed the wolf a bone, except for the last one, when you have tamed it, in which case there will be heart particles.

Happy to help...

7 0
3 years ago
Other questions:
  • An email message form includes all of the following main areas except
    11·2 answers
  • All ofthe following are correct EXCEPT one option when it comes towriting disappointing news letters. Identify theexception.
    6·1 answer
  • What is DAP? How LDAP is different from DAP?
    10·1 answer
  • 11. The golden rule of safe driving is: A. Always drive at the posted speed limit B. Never drive while physically or mentally im
    6·1 answer
  • Please answer <br><br> Steps 1-6 <br><br> Visual basics
    7·1 answer
  • What is the easiest way to deploy a C++ program to a user’s computer? a. Copy the source code to the user’s computer and then co
    13·1 answer
  • Candy Kane Cosmetics (CKC) produces Leslie Perfume, which requires chemicals and labor. Two production processes are available:
    14·1 answer
  • Which technological tool is important for storing critical files?.
    12·1 answer
  • Can somebody please help me with these few questions?
    11·1 answer
  • Who is the king of computers?
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!