1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexandra [31]
3 years ago
15

Algoritmos para llevar a cabo una actividad

Computers and Technology
1 answer:
Inessa05 [86]3 years ago
7 0

Answer:

Si Si

Explanation:

duij  jdsudi dsjdak

You might be interested in
I have python homework and I’m struggling with it
melamori03 [73]

Answer:

okay

Explanation:

what's the question

5 0
3 years ago
When people take a image on their phone how can they copy the image into google docs.
fomenos
You mean when they screen shot it? 
5 0
4 years ago
Read 2 more answers
JAVA QUESTION::
allochka39001 [22]

Answer:

3) 44 10 44

Explanation:

Given data

int [] val = { 3, 10, 44 };

The total number of parameters of given array are 3, so total length of array is also 3.

The indexing of array starts with '0', Therefore the <u>indexes</u> of array with length zero are: {0,1,2}

The value of array at index 0 is = 3

similarly

value at index 1 = 10

value at index 2 = 44

Any value of index 'i' of an array is selected using array[i].

Therefore,

val[0] is selecting the value of array located at index '0'.

val[0] = 3

val[2] is selecting the value of array located at index '2'.

val[2] = 44

Finally,

val[0] = val[2]; is copying the value placed at index 2 (44) to value placed at index 0 (3). Hence, the output would be { 44 10 44}. So 3rd option is correct.

 

8 0
4 years ago
Unwanted email sent to large groups of people who did not request the communication is called _____
viktelen [127]
Spam mail is the answer
4 0
3 years ago
What network device manages its resources??
Lyrx [107]
A 'server' is the network device that manages its resources.

8 0
4 years ago
Other questions:
  • What makes sqlite an appropriate choice for an android application, compared to other relational database management systems, su
    15·1 answer
  • (Please select 2)
    14·1 answer
  • You use a __________________ tool to push wires into a keystone jack and cut off the end of the wires.
    7·1 answer
  • Question 9 (1 point)
    14·1 answer
  • Installation and the ongoing maintenance of software in a database system are the job of the database __
    6·1 answer
  • What two benefits are a result of configuring a wireless mesh network? Check all that apply.
    12·1 answer
  • As the first step, load the dataset from airline-safety.csv by defining the load_data function below. Have this function return
    9·1 answer
  • _______________ ________________ have human editors that evaluate, select, and organize websites into a hierarchy of categories.
    11·1 answer
  • Kylee needs to ensure that if a particular client sends her an email while she is on vacation, the email is forwarded to a cowor
    7·1 answer
  • Which of the following security policies can be implemented to prevent removable media from automatically launching potentially
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!