1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tamaranim1 [39]
2 years ago
5

Assume that a file contains students' ids, full names, and their scores (Assignments grade, quizzes grade,

Computers and Technology
1 answer:
elixir [45]2 years ago
3 0

Answer:

اope its heمحبعم

Explanation:

You might be interested in
Who found the first computer bug in 1947, and invented the concept of a compiler in 1952
Anastaziya [24]

Grace Hopper is credited with the first documented computer bug. She also devoped the first compiler, while working at Remington in 1952.

3 0
2 years ago
Write any two rules for writing algorithm​
inessss [21]

Answer:

1) = input and output should be defines precisely

2) = it shouldn't include computer code

5 0
3 years ago
PLZZZ HELP!!!
kifflom [539]

Answer:

D the answer is D or c one of those 2

3 0
3 years ago
Samantha has to create a video for her science project on the blossoming of a flower from a bud to one with fully opened petals.
Hitman42 [59]
Samantha would have to use the ‘time-lapse’ technique to film the video in the most efficient way.
5 0
3 years ago
Read 2 more answers
Selah infects the ads on a website that users from her target company frequently visit with malware as part of her penetration t
ValentinkaMS [17]

Selah infects the ads on a website with a technique called the Watering hole attacks.

<h3> What is Watering hole attacks?</h3>

The  Watering hole attacks is known to be a form of attack that depends on compromising or infecting a website that has or that targeted users who are known to often frequently visit.

So, Selah infects the ads on a website with a technique called the Watering hole attacks.

Learn more about malware from

brainly.com/question/399317

#SPJ1

8 0
1 year ago
Other questions:
  • Pointsyour company environment includes windows server versions 2003, 2008, and 2012. desktops range from windows xp and vista.
    13·1 answer
  • Which is true about POP3 and IMAP for incoming email?
    6·1 answer
  • Why was the movable type of the printing press such a breakthrough for publishing?
    15·2 answers
  • Which command will display the current contents of non-volatile random-access memory (nvram)?
    14·1 answer
  • Which two actions allow the System Administrator to limit Chatter access during roll-out to a subset of Salesforce users?
    9·1 answer
  • Krya needs help deciding which colors she should use on her web page. What can she use to help her decide.
    11·1 answer
  • Which interpersonal skill is the most important for a telecom technician to develop?
    7·1 answer
  • Give an example where traditional laws and modern media have created "grey areas".
    6·1 answer
  • Classify computer based on signal
    14·1 answer
  • In what way, if any, is the impact of a given risk affected by the timing of a project?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!