1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mr Goodwill [35]
3 years ago
11

Which of the following best describes a feedback loop?

Computers and Technology
1 answer:
icang [17]3 years ago
8 0

Answer:

I believe it might be: A response to something you do online that causes your brain to experience a temporary moment of pleasure.

Explanation:

Sorry if I got it wrong.

You might be interested in
The option to publish a file as a blog post is located in the____options on the File tab.
shtirl [24]
The answer is #2: Share
3 0
3 years ago
Which type of software is created on user dimension​
Ratling [72]

Answer:

Application and system software is created on user dimension.

6 0
3 years ago
Microsoft issued the Windows ME operating system. What was the impact of this 'rush to market' software product on users and Mic
Murrr4er [49]

Answer:

The answer is below

Explanation:

Windows ME which originally meant Windows Millennium Edition. It was released in 2000. However, due to its poor functionality and efficiency, it appeared like it was rushed on the part of Microsoft to release the latest Operating System at the time. This led to some impacts on both the users and Microsoft.

1. On the Users' part: it was considered the most hated edition. Some even renamed it "Windows Mistake Edition." Users quickly dumped it for a later edition of Microsoft OS which was "Windows XP."

2. On Microsoft's part: it badly affected their reputation in the market at that period. It was the launch of Windows XP and later window 7 that revived the good reputation of Microsoft going forward.

3 0
3 years ago
write a function that counts the number of times the value of y occurs in the first n values in array x. y is an integer variabl
mixer [17]

Answer:

Following are the function of count:

void count(int y,int x[],int n) // function definition of count

{

int k,count=0;  // variable declaration

for(k=0;k<n;++k) // iterating over the loop

   {

   if(x[k]==y) //check the conndition number of times the value of y occurs

   {

   count++; // increment of count by 1

   }

   }

Explanation:

Following are the code in c language

#include <stdio.h> // header file  

void count(int y,int x[],int n) // function definition of count

{

int k,count=0;  // variable declaration

for(k=0;k<n;++k) // iterating over the loop

   {

   if(x[k]==y) //check the conndition number of times the value of y occurs

   {

   count++; // increment of count by 1

   }

   }

   printf(" the number of times the value of y occurs :%d",count); // display count value

   }

int main() // main method

{

   int x[100],y,n,k; // variable declarartion

   printf(" Enter the number of terms n :");

   scanf("%d",&n); // input the terms

   printf(" Enter the array x :");

   for(k=0;k<n;++k) // input array x

   {

   scanf("%d",&x[k]);

   }

   printf("Enter the value of y:");

   scanf("%d",&y);// input value y by user

    count(y,x,n); // calling function

   return 0;

}

In the given program we declared an array x ,variable  y and n respectively Input the array x ,y,n  by user after that we call the function count .In the count function we iterate the loop from o position to array length-1 and check the number of times the value of y occurs by using if statement  i.e  if(x[k]==y) if the condition of if block is true then we increment the count variable Otherwise not .Finally display the count variable which describe the number of count.

Output

Enter the number of terms n :5

1

2

2

56

5

Enter the value of y:2

the number of times the value of y occurs :2

Enter the number of terms n :5

1

2

3

56

5

Enter the value of y:26

the number of times the value of y occurs :0

7 0
3 years ago
The Wired Equivalent Privacy standard had what significant disadvantage?
Ivanshal [37]

Answer:

Wired equivalent privacy standard has the significant disadvantages as, it is uses the static encryption keys. Wired equivalent privacy are the security and the privacy protocol which are used for designing the wireless local area network. And the static encryption key are used to set up the router for encrypting the packet in the device. The main disadvantage is that it enables the MAC address and it is easily detectable by the hackers.  

 

6 0
3 years ago
Read 2 more answers
Other questions:
  • Annie is a nutritionist. She is conducting seminars about following a healthy diet in various offices. Annie adds a picture of f
    14·2 answers
  • In the game of economics, which player has the role of providing goods and services
    10·1 answer
  • Use the Internet and other sources to research the two disadvantages of standard biometrics: cost and error rates. Select one st
    10·1 answer
  • What happens when a magnet is close to a iron nail?
    12·1 answer
  • _______ data would be useful for creating a report containing last year's revenue, which won't be changing.      A. Integrated B
    12·1 answer
  • What shortcut keys do i use to print something on my keyboard ?
    6·2 answers
  • The mathematical constant Pi is an irrational number with value approximately 3.1415928... The precise value of this constant ca
    12·1 answer
  • How can a user access the Mailbox Cleanup tools?
    11·2 answers
  • Which of the following technique is well suited to support very large address space, e.g. 64-bit address space? Select one: a. C
    11·1 answer
  • how do i turn off itallics on a school chromebook i accidentally turned them on in another tab and i dont know how to undo them
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!