1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jok3333 [9.3K]
2 years ago
5

Does any one know how to code? If you do can you help me with my project?

Computers and Technology
2 answers:
Hunter-Best [27]2 years ago
8 0

i can help you man

-scav aka toby

fomenos2 years ago
4 0

Answer:

kinda look it up!!!

Explanation:

go to code.org free coding

You might be interested in
What is one difference between the Simple Gear Train with Same Size Gears and Simple Gear Train with Different Size Gears?
polet [3.4K]

Answer:

One difference between a Simple Gear train with Same Size Gears and Simple Gear Train with Different Size Gears is the that the number of rotations of both shafts in the Simple Gear Train with Same Size Gears is the same the number of rotations of both shafts in the simple Gear Train with Different Size Gears are different

Explanation:

A simple gear train is one in which each shaft has only one shaft, and the motion of one shaft in transmitted to the other when the gears are in contact

5 0
2 years ago
A chief Information Security Officer (CISO) is performing a BIA for the organization in case of a natural disaster. Which of the
nataly862011 [7]

Answer:

The correct answer is option (D) Identify the impact on safety of the property

Explanation:

Solution

In every Business Impact Analysis, the first and the most important step is for the CISO is to identify and estimate the impact of the aftereffects on the business and property of an organization that may be occurred from the disaster.

Physical security is very important, but it is not noticed by most organizations. It is important if you do not want anyone to take  away your information or destroy it, in case of natural calamity. the reason could be that, the intruder is  doing it for his personal achievement, financial gain,or seeking revenge or when one is taken unaware and becomes a target. If this security is not maintained properly all the safety measures will not be useful once the attacker gets through by gaining physical access.

Example of property can be software, equipment, facilities, company’s assets.

4 0
3 years ago
: For each of the following words identify the bytethat is stored at lower memory address and the byte that is storedat higher m
Aloiza [94]

Answer:

In a <u>little endian computer</u> -The data's least substantial byte is put at the lower address byte. The remaining information will be put in memory in order in the next three bytes.

a)1234

4 is placed at the least significant bits,so this byte stored at lower memory address.

1 is placed at the most significant bits,so this byte stored at higher memory address.

b) ABFC

C is placed at the least significant bits,so this byte stored at lower memory address.

A is placed at the most significant bits,so this byte stored at higher memory address.

c) B100

0 is placed at the least significant bits,so this byte stored at lower memory address.

B is placed at the most significant bits,so this byte stored at higher memory address.

d) B800

0 is placed at the least significant bits,so this byte stored at lower memory address.

B is placed at the most significant bits,so this byte stored at higher memory address.

5 0
2 years ago
You are installing windows on a new computer. Using the RAID controller on the motherboard, you configure three hard disks in a
Sergio [31]

Answer:

On the screen where you select the disk to install Windows, click "Load Driver"

Explanation:

While the user has Windows installed on a new system. Instead, he configures several hard disks in such a RAID 5 series using the RAID controller onto the motherboard. The user is left unpartitioned and improperly formatted in the list. He edits that boot request from either the optical drive for the BIOS to boot. He installs DVD drive, begins the configuration, and boots to the disk.

Then press the "Load Driver" button on the monitor where he picks the disk to install Windows

7 0
2 years ago
Which of the following lists the types of copyright license from most restrictive to least restrictive?
scoundrel [369]

Answer:

All Rights Reserved, Some Rights Reserved, Public Domain

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • The Fully Meets rating should be assigned when the spelling suggestion matches query intent
    11·1 answer
  • The expressionvecCont.empty() empties the vector container of allelements.
    13·1 answer
  • If you need to use a custom theme frequently, you can save a presentation file as a(n) ____ theme file.
    12·2 answers
  • Numeric data is stored in ___________ for direct processing.
    6·2 answers
  • The major objective of this lab is to practice class and object-oriented programming (OOP), and separate files: 1. We will reuse
    5·1 answer
  • In the code snippet below, pick which instructions will have pipeline bubbles between them due to hazards.
    12·1 answer
  • wants to redesign the user interface. The customer service agents use ________ to enter explicit statement to invoke operations
    11·1 answer
  • What is MS-Word? Write some versions of MS-Word.
    8·2 answers
  • Which sentence describe internet safety precautions?
    5·1 answer
  • Is a class of software used to meet organization-wide business needs and typically shares data with other enterprise application
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!