1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Contact [7]
3 years ago
7

ONlY OnE pErcEnT oF pEOpLe CaN sOlvE tHiS!

Computers and Technology
2 answers:
balandron [24]3 years ago
8 0

Answer:

I really don't think I'm one of those people in that 1%

Explanation:

(Sorry)

igomit [66]3 years ago
7 0

Answer:

yeeee

Explanation:

You might be interested in
How does speech recognition software know what you are saying?
boyakko [2]
It converts the mic input into a string of raw data, then compares it to hundreds, even thousands of voice samples. The output is a polished string of data in words.
8 0
3 years ago
+20 POINTS!!!~~~~~When adding delegates to his mailbox, which role should Joel use if he would like the user to be able to read
DochEvi [55]

Answer:

b on edge

Explanation:

4 0
3 years ago
You must configure an ip address on a catalyst 2950 xl switch using the default management switch port. from global configuratio
BlackZzzverrR [31]
Int vlan 1ip address 192.168.10.2 255.255.255.0
Is the command that definitely would you enter to configure the correct management port. So we must configure the IP address on a catalyst 2950xl switch using the default management switch port from the global configuration mode. The answer in this question is int vlan 1ip address 192.168.10.2 255.255.255.0 

7 0
3 years ago
Write a program whose input is an email address, and whose output is the username on one line and the domain on the second. Exam
kirill115 [55]

Answer:

1 void parseEmailAddress(string email, string& username, string& domain)

2 {

3   int found = email.find("@")

4   if (found > 0)

5   {  

6     username = email.substr(0, found);  

7      domain = email.substr(found+1, -1);

8   }

9   return;

10}

Explanation line by line:

  1. We define our function.
  2. We use an open curly bracket to tell the program that we are starting to write the function down.
  3. We apply the find method to the email variable that was passed by the main program. The find method tells us where is the "@" located within the email.
  4. We use an if statement to ensure that the value that we found is positive (The value is negative if an only if "@" is not in the email address).
  5. We use an open curly bracket to tell the program that we are starting to write inside the if statement.
  6. We apply the substr method to the email to take the username; it receives a start and an end value, this allows us to take from the beginning of the email (position 0) until the "@".  
  7. We apply the substr method to the email to take the domain; it receives the position of the "@" character plus one to take the first letter after the "@" and a minus-one representing the last character on the email.
  8. We use a closing curly bracket to tell the program that the if statement has finished.
  9. We return nothing because we are using reference parameters, which means that the memory positions of username and domain are going to be filled by our parseEmailAddress function and the main function can access those values directly.
  10. We use a closing curly bracket to tell the program that the function has finished.
6 0
3 years ago
Network does not provide security to us​
Zinaida [17]

Answer:

<u>May this answer be helpful for you </u>

Explanation:

<u>1.False. </u>

<u>1.False. 2.Network security has many policies which ensure the secure surfing of the internet. </u>

<u>1.False. 2.Network security has many policies which ensure the secure surfing of the internet. 3.The policies do not allow unauthorized access. 4.Thus, network does provide security to us.</u>

3 0
3 years ago
Other questions:
  • When you declare a string data type, you are actually creating an object from the?
    5·1 answer
  • In these weeks readings, we learned about the CIA Triad and how each exhibits dependence on the other. Give examples of how fail
    12·1 answer
  • How to solve 3(x - 2) = 9x<br><img src="https://tex.z-dn.net/?f=3%28x%20-%202%29%20%3D%209x" id="TexFormula1" title="3(x - 2) =
    14·1 answer
  • Write a function safeOpen() that takes one parameter, filename — a string giving the pathname of the file to be opened for readi
    15·1 answer
  • A technician has just installed a video card in a PC. The video card is not working, althoughit was working fine on the test ben
    6·1 answer
  • Need Help!
    9·1 answer
  • Which graph is the solution to the system 2x – 3 and y &lt; 2x + 4?
    5·2 answers
  • 1. What does the word “processing” in data pro- cessing mean?
    13·2 answers
  • A system forensics specialist has three basic tasks related to handling evidence: find evidence, preserve evidence, and ________
    6·1 answer
  • Can a dod activity enter into a service contract for a military flight simulator without getting a waiver from the secretary of
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!