1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ANTONII [103]
3 years ago
5

Lesson 9 looping and random numbers

Computers and Technology
1 answer:
Pavlova-9 [17]3 years ago
8 0

Answer:

??????????????????????????????????????????////

Explanation:

You might be interested in
Difference between volatile and non volatile memory
slega [8]
<span>Volatile memory requires electricity or some kind of current to store information, and nonvolatile memory does not.</span>
6 0
3 years ago
Read 2 more answers
Respond to Social EngineeringYou work as the IT security administrator for a small corporate network. The company president has
Cloud [144]

Answer:

Delete any emails that are attempts at social engineering

Explanation:

The actual URL of an email could tell if an hazardous, an unwanted or an unexpected email is being received, hence one can be sure of social engineering through this means. Hence, this could provide a solution to this problem.

4 0
4 years ago
Shortcuts will help you complete spreadsheet tasks more efficiently.
max2010maxim [7]
Ctrl(control) + s = save
Tab = auto complete formula
ctrl +c =copy'
ctrl+v = paste
ctrl +z = undo

you can also drag your formula down different cells

3 0
3 years ago
Create a text file content.txt and copy-paste following text (taken from Wikipedia) into it: A single-tasking system can only ru
elixir [45]

Answer:

s0 you should figure that out because I don't know how to

Explanation:

good luck

8 0
3 years ago
_______ refers to physical computer equipment, such as the computer monitor, central processing unit, or keyboard.
lesya692 [45]
The Hardware refers to the physical computer equipment, such as the monitor, keyboard, mouse etc.
5 0
3 years ago
Other questions:
  • Regarding an intrusion detection system (IDS), stateful matching looks for specific sequences appearing across several packets i
    9·1 answer
  • Which is the highest level of the hierarchy of needs model?
    7·2 answers
  • What finger is used to key letter c
    12·2 answers
  • Robert is leading a project online that includes students from different cultures. Two of the students spend most of the time li
    7·1 answer
  • Byron wants to use Quick Parts to insert reusable content into a company Word document. Where will he access this option? Design
    11·2 answers
  • A user brings a technician a mobile device that has no sound. What should a technician check for first?
    5·1 answer
  • What does a mother board in a computer do?
    11·1 answer
  • তথ্য ও যোগাযোগ প্রযুক্তির প্রশ্ন(45)10 সংখ্যাটির সমতুল্য মান?
    14·1 answer
  • This study highlights that people access social networking sites to be
    12·1 answer
  • A process spawning or initiating another process is referred to as _____
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!