1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anon25 [30]
3 years ago
10

3.6 Code Practice on Edhesive

Computers and Technology
1 answer:
Alchen [17]3 years ago
6 0

I've included my code in the picture below. Best of luck.

You might be interested in
A _______ is used to analyze and summarize your data without graphical support.
hodyreva [135]
Pivot table is the answer
8 0
4 years ago
What are the three parts of a camera
son4ous [18]

Answer: Camera lens, Film or sensors, and body.

Explanation: I researched it.

8 0
3 years ago
Explain the importance of signaling in the telephone network.
k0ka [10]

Answer: Please see below as the answer is self-explanatory

Explanation:

In a telephone system, we call signaling to all signals that are originated within a telephony circuit, that are not part of the conversation between the calling parties.

We include in this broad category, the signal generated by the calling party when he picks up the phone, the call tone sent to him by the switch (or the busy tone if the call can't be established due to blocking), the digits that identify the called party, the ringing signal that informs the called party that someone is trying to reach him for a call, among others like are defined in the SS7 or the different 2G/3G/4G Cellular standards.

The importance of the signalling is pretty obvious; without these signals, it will be virtually impossible to set up a connection between the two parties.

8 0
4 years ago
What should we do to prevent software piracy?
frozen [14]

Answer:

1. Read the End User License Agreement (EULA) for each software product you purchase.

2. Purchase CD software only from reputable resellers.

3. Purchase software downloads directly from the manufacturer's website.

4. Register your software to prevent others from attempting to install your software on their computers.

5. Report piracy if you discover that software you purchased is not authentic or if you suspect that an online reseller or retail establishment is selling counterfeit software.

Link: https://www.techwalla.com/articles/how-to-stop-software-piracy

-Please mark as brainliest!- Thanks!

7 0
3 years ago
What type of data causes concern for institutions or business when collected, stored, and not secured properly
expeople1 [14]

Answer:

personal identeifying information

Explanation:

hope this is right and it helped

4 0
2 years ago
Other questions:
  • What is an (CR) Optical character recognition?
    13·2 answers
  • What would be a situation in which you could use an Excel chart to present your data?
    11·2 answers
  • 1 Explain the difference between using a computer program and programming a computer.
    12·1 answer
  • After reviewing device security you learn that a malicious user in an airport
    14·1 answer
  • Original documents or objects used during Internet research are known as
    8·2 answers
  • Rom a game design perspective, including some risks in your game can help make it both exciting and challenging, but also what e
    15·1 answer
  • With which type of satellite is there a propagation delay?
    5·1 answer
  • In the chemical reaction of baking cookies, the product is?
    11·1 answer
  • What is the difference between applying risk measures for insurance purposes versus applying risk measures for compliance? Provi
    11·1 answer
  • You are looking for a computer to provide a central location for online game play. What kind of computer do you need
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!