1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natka813 [3]
3 years ago
13

Find what the secret message is. Get Brainliest if you are fast and correct.

Computers and Technology
2 answers:
Firdavs [7]3 years ago
8 0

Answer:

What does your digital footprint say about you?

Explanation:

Just follow the path from the end to the start, that's how I always get mazes.

Maurinko [17]3 years ago
7 0

Answer:

What does your digital footprint say about you?

Explanation:

You might be interested in
what illustrates the movement of information between external entities and the processes and data stores within the system?
andrew11 [14]

A data flow diagram is a graph that shows how data moves between internal operations and external entities as well as between data stores and activities within a system.

<h3>What does the movement of data between internal processes and data stores and external entities look like? </h3>
  • A data flow diagram is a graph that shows how data moves between internal operations and external entities as well as between data stores and activities within a system.
  • A data flow diagram (DFD) is a visual representation of how data moves between processes and data stores inside or outside of a system as well as between external entities.
  • One of the deliverables for process modeling is context DFD.As seen on the DFD flow chart in Figure 5, a data flow diagram (DFD) is a graphical depiction of the "flow" of data through an information system, simulating various process elements.
  • Information traveling through processes and data stores to reach the system is known as data flow.The DFD can show you the direction of the data flow with arrows and brief labels.

To learn more about data flow diagram refer

brainly.com/question/23569910

#SPJ4

5 0
1 year ago
Create a function, return type: char parameters: int *, int * Inside the function, ask for two integers. Set the user responses
iris [78.8K]

Answer and Explanation:

In C programming language:

char fun(int*a, int*b){

printf("enter two integers: ");

scanf("%d%d",a,b);

int e;

printf("please enter a character: ");

e=getchar();

return e;

}

int main(int argc, char *argv[]) {

int d;

int f;

int g;

fun();

printf("%d%d%d", d, f, g);

}

We have declared a function fun type char above and called it in main. Note how he use the getchar function in c which reads the next available character(after the user inputs with printf()) and returns it as an integer. We then return the variable e holding the integer value as char fun() return value.

4 0
3 years ago
Which of the following is a good question to ask during an informational interview
Dmitrij [34]
The answer is:

What was your education/training path? It is related to education and information
8 0
4 years ago
Choose the two (2) statements that are true about functions​
Natalka [10]

Answer:

In the given question statements are missing. So, we assume two true statements. Which can be given as :

  • Function name should be meaning full  
  • Programming features are called programming instruction groupings.

Explanation:

In the programming language, a function is a group of organized code that is used to increases the reusability of the program. In the declaration of the function we should remember two points which is can be described as:

  • function name should be meaning full means is that if we want to print some data in function. So, we write a function name that is matched to its data like message, information, data, etc. these names help another programmer to understand more easily.  
  • In the function, Programming features are called programming instruction groupings.

That's are the statements for function that is described above.

4 0
3 years ago
Oskar has been receiving emails about critical threat intelligence information from a public information sharing center. His tea
zlopas [31]

The technology that Oskar is going to recommend for the automated process would be the automated indicator sharing.

<h3>What is the automated indicator sharing?</h3>

This is a cyber security and also an infrastructure security operations that helps to show cyber threat indicators in real time.

They help to prevent cyber attacks and also put in the measures that can protect the members of the community.

Read more on the automated processes here: brainly.com/question/25707319

4 0
2 years ago
Other questions:
  • What button is marked with the little hollow square at the top of the right window
    7·2 answers
  • Which of the following is NOT a group on the Slide Master tab?
    6·1 answer
  • which type of website would a business selling merchandise on the internet use? A person B information C commercial D social
    9·1 answer
  • You have a site (Site1) that has about 20 users. For the last few months, users at Site1 have been complaining about the perform
    9·1 answer
  • Why would you group data in a report? SQL
    9·1 answer
  • Terry is having a problem with his computer screen. He said the screen looks distorted. When you go to check his monitor, you no
    8·1 answer
  • Write a function that implements another stack function, peek. Peek returns the value of the first element on the stack without
    11·1 answer
  • Fallon is a new student on campus. Everywhere she goes, she is asked for her 12-digit student number. To memorize her new studen
    10·1 answer
  • Which is the name of a note-taking method that can be used when watching a video? SQRW sticky notes charting highlighting
    13·2 answers
  • 8. Assuming str(rate) is "7.25," what output would be produced by the following snippet:
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!