1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Daniel [21]
3 years ago
10

Who wants to trade ro^lox accounts

Computers and Technology
2 answers:
telo118 [61]3 years ago
8 0
Make me brainlestttt please and thank you and the answer is no
Arada [10]3 years ago
5 0

Answer:

mayb

Explanation:

You might be interested in
Working together, printer A and printer B would finish the task in 24 minutes. Printer A alone would finish the task in 60 minut
sasho [114]

Answer:

The correct answer to this question is option (1).

Explanation:

Let x1 = Is number of pages that printer A can print  in page/minute.  

thus x1 + 5 = Is number of page that printer B can print in page/minute.  

As printer A finishes his work in 60 min. So the task has 60x1 pages. As printers A and B both finish that task in 24 minutes. So the equation can be given as:  

60x1 = 24x1 + 24(x1 + 5)  

 

60x1 = 24x1 + 24x1 + 120  

 

60x1=48x1 + 120

 

60x1-48x1=120

 

12x1=120  

 

x1=120/12

 

x1=10

put the value of x1 in to (60x1). Therefore, the task has 60(10) = 600 pages. the task contains 600 pages.  

So the answer to this question is option (1).

7 0
3 years ago
Can someone help me with this pls
Dimas [21]

I know the first one shown in the picture but I can't see the one under it I can help you if you can show the whole problem under the first problem.

5 0
3 years ago
Read 2 more answers
If AL contains binary 1000 1111, which one will show the information of the binary bits in AL after performing operation SHR AL,
padilas [110]

Answer:

a) AL will contains 0011 1100

Explanation:

In assembly language, shifting bits in registers is a common and important practice. One of the shifting operations is the SHR AL, x where the x specifies that the bits be shifted to the right by x places.

SHR AL, 2 therefore means that the bits contained in the AL should be shifted to the right by two (2) places.

For example, if the AL contains binary 1000 1111, the SHR AL, 2 operation will cause the following to happen

Original bit =>                                        |   1  |  0 |  0  |  0  |  1 |  1 |  1 |  1 |

Shift once to the right =>                |  1 |   0 |  0  |  0  |  1 |  1 |  1 |  1 | (0) |

Shift once to the right =>          |  1 |  0 |  0  |  0  |  1 |  1 |  1 |  1 | (0) | (0) |

Notice;

(i) that there are two shifts - one at a time.

(ii) that the bits in bold face are the bits in the AL after the shift. Those that in regular face are those in the carry flag.

(iii) that the new bits added to the AL after a shift are the ones in bracket. They are always set to 0.

5 0
3 years ago
Adam is evaluating the security of a web server before it goes live. He believes that an issue in the code allows an SQL injecti
givi [52]

The term vulnerability describes the issue that Adam discovered.

b. vulnerability

<u>Explanation:</u>

SQL injection attack is an attack in which an external party can execute SQL commands on the database that serves as a back-end for a particular website. The SQL commands can be used to modify the contents of the website, modify the records, delete the records, and retrieve confidential information as well.  

As Adam believes that the code has an issue that allows a SQL injection attack, the term that best describes the issue that he discovered is vulnerability. The website is vulnerable since the code does not have a proper procedure to tackle a situation of SQL injection attack.

7 0
3 years ago
Lawanda starts a new job today at a company that delivers thousands of packages each day. Identify three ways in which Lawanda's
jek_recluse [69]

Answer:

use your own opinion

Explanation:

7 0
3 years ago
Other questions:
  • Jason is an aspiring filmmaker. He manages finance and makes sure that everyone is involved in the project. Which role is Jason
    12·1 answer
  • Discuss the differences between permanent internal memory and volatile internal memory.
    14·1 answer
  • I love dog my is 16 weeks old how old is yours
    12·1 answer
  • You are adding a new 500 GB hard drive to your computer. The hard drive must be formatted with a file system to organize files i
    8·1 answer
  • Describe how learning can be accessed in your class?​
    14·1 answer
  • The ______________ shows that you have fully researched the topic and gives you a chance to prove your claim.
    8·1 answer
  • The Self-Quiz gives you an opportunity to self-assess your knowledge of what you have learned so far.
    13·1 answer
  • Is e commerce a challenge or opportunity to the freight forwarder
    8·1 answer
  • Synthesize (15 points)
    13·1 answer
  • Cybersecurity is defined as the set of techniques to protect the secrecy, integrity, and availability of computer systems and da
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!