1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
creativ13 [48]
3 years ago
14

Only answer this question properly​

Computers and Technology
1 answer:
leonid [27]3 years ago
5 0

Answer:

hi.......,.........

Explanation:

I wish it help you

Make me brainly

You might be interested in
What are some examples and non-examples of digital security?
deff fn [24]

Answer:

Devices such as a smart card-based USB token, the SIM card in your cell phone, the secure chip in your contactless payment card or an ePassport are digital security devices

5 0
3 years ago
To create a cover letter to send to potential employers along with a resume, what software program should you use?
spayn [35]
Sending letters is easier when an individual is using an email. Emails are very easy to access, they can be sent twenty four / seven (24/7) and can also be received 24/7. Examples of email programs are yahoo and google websites.
3 0
3 years ago
Consider the following two tables where EmployeeNum is primary key in both tables. What is the result of combining the two table
Ilya [14]

Answer:

B) Employee (EmployeeNum, LastName, FirstName, WageRate, SocSecNum, DepartmentNum, Street, City, State, PostalCode)

Explanation:

3 0
3 years ago
Refer to the method f:
Goshia [24]
<h2>This function will land up in infinite function call</h2>

Explanation:

first time when the function gets invoked,

f(6,8), so k=6 & n=8, inside the function it checks k==n, ie. 6==8, returns false, then one more if is available, so 6>8 is check for , once again it is false and else loop is executed, the function is called recursively using f(k-n,n), that is f(6-8,8), it means f(-2,8) is passed.

Second time,

if(-2==8) is false, so if(-2>8) is again false and function f(-10, 8) is called

if(-10==8) is false, so if(-10>8) is again false and function f(-18,8) is called

if(-18==8) is false, so if(-18>8) is again false and function f(-26,8) is called

So this goes recursively and ends in an infinite function call.

5 0
4 years ago
What are the common causes of signal loss in fiber optic cable connectors
timurjin [86]
Bending, twisting, or the overall age of the cable, or other stuff like that.
8 0
3 years ago
Other questions:
  • Stock ____ firms trade financial securities between a buyer and a seller.
    11·1 answer
  • Ou have an application running on Oracle Cloud Infrastructure. You identified that the read and write operations are slowing you
    10·1 answer
  • What letter names the drive where windows most commonly stores data and files
    13·1 answer
  • A user has connected a USB 3.0 device to a computer using a 3 ft (1m) USB 3.0 cable. However, instead of an expected data transf
    9·1 answer
  • Which operating system became obsolete with the arrival of more advanced graphical user interfaces
    12·1 answer
  • The point of entry from a wireless device to a wired network is performed at a device called a(n) ____________________.
    10·1 answer
  • )duplicate hash code
    15·1 answer
  • In what way can the use of switches in LAN networks impact overall network throughput?
    5·1 answer
  • Electronic business includes which of the following
    5·2 answers
  • Order the steps to use a logical argument as a rule type.
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!