1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Snezhnost [94]
3 years ago
11

Me Completan Pliiiis

Computers and Technology
1 answer:
Brut [27]3 years ago
4 0
Can you translate please i’ll help better
You might be interested in
Why is there more than one Brainly website?
marta [7]

they are for different countries and languages

8 0
2 years ago
Read 2 more answers
Which disclosure paradigm has as its assumptions that 1) an attacker will learn little or nothing from disclosure; 2) Disclosure
nekit [7.7K]

The  disclosure paradigm has as its assumptions that an attacker will learn little or nothing from disclosure is known as Open source.

<h3>What is open source?</h3>

An  Open source is known to be a term that connote that is said to be an Open source software set up to be publicly used by people.

Therefore, The  disclosure paradigm has as its assumptions that an attacker will learn little or nothing from disclosure is known as Open source.

Learn more about Open source from

brainly.com/question/6065176

#SPJ1

3 0
2 years ago
PLEASE HELP!!! NO LINKS PLEASE!!!! 50 POINTS!!!!!
iragen [17]

Answer:

ang hirap naman plss answee

5 0
2 years ago
Three basic components to cloud computing are client, internet
MrRissso [65]

Answer:

the basic components of cloud comuting in a simple topology

3 0
3 years ago
1. Write an application that prompts the user to enter the size of the side of a square, and then displays a hollow square of th
belka [17]

Answer:

import java.util.Scanner;

public class HollowSquare

{

public static void main(String args[])

{

Scanner scan = new Scanner(System.in);

int size;

System.out.print("Enter the size : ");

size = scan.nextInt();

if(size>=1 && size<=20)

{

for(int i=0; i<size; i++)

{

for(int j=0; j<size; j++)

{

if(i==0 || j==0 || i==size-1 || j==size-1)

System.out.print("*");

else

System.out.print(" ");

}

System.out.println();

}

}

else

System.out.println("Invalid size.");

}

}

4 0
3 years ago
Other questions:
  • Which risk mitigation framework allows scope for research and acknowledgement for risk mitigation?
    9·2 answers
  • The document asks about dependents because the number can
    12·2 answers
  • If you delete an imessage does the other person see it
    12·1 answer
  • How to get out of the verify your identity page on a dell laptop because it won’t let me
    13·1 answer
  • A type of wireless local area network technology​
    7·2 answers
  • What would be the result of the following code? ages = {'Aaron' : 6, 'Kelly' : 3, 'Abigail' : 1 } value = ages['Brianna']
    9·1 answer
  • A(n) ____________________ is a hardware device or software utility designed to intercept and prevent unauthorized access to a co
    6·1 answer
  • A user has just clicked the OK button on a Web form. Which technology is often used to process information sent from the form?
    5·1 answer
  • Where in PowerPoint should a user navigate to complete the tasks listed below?
    6·1 answer
  • Identify the three fuzzy logic systems in the given text.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!