1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
grandymaker [24]
3 years ago
12

Que es la felicidad??​

Computers and Technology
1 answer:
olchik [2.2K]3 years ago
4 0
Se feliz el amor es nada
You might be interested in
a computer technician performed a number of actions to correct a problem. some actions did not solve the problem, but eventually
padilas [110]

The technician should document all that was done to try to solve the problem. A detailed record is a good practice to find solutions.

A detailed record documenting all steps by which a problem was solved is a good practice for technicians.

This documented record will help the computer technician to find the cause the next time.

Clear, accurate records support decision-making and solving problems in any job and profession.

Learn more about detailed records here:

brainly.com/question/6284693

4 0
2 years ago
Name the major types of computer systems from slowest to fastest. ​
Vadim26 [7]

Answer:

Cache is the fastest and most expensive, RAM is slower and less expensive, and virtual memory is the slowest and least expensive type.

Explanation:

3 0
3 years ago
Explain the derived data types in C language with examples each
IRISSAK [1]

Answer:

Array, pointers, struct, and union are the derived data types.

7 0
3 years ago
Network layer protocols specify the _______ structure and processing used to carry data between hosts.
kari74 [83]

Network layer protocols specify the  <u>packet structure</u> and processing used to carry data between hosts.

<h3>What is the Network layer protocols  about?</h3>

The header, payload, as well as the trailer of a network packet are its three component pieces. The underlying network architecture or protocol employed determines the format and size of a network packet. A network packet resembles a package in concept.

Therefore, Network layer protocols define the packet format and processing needed to transfer data from one host to another host, in contrast to the Transmission layer (OSI Layer 4), which controls the data transport between the programs operating on each end computer.

Learn more about Network layer from

brainly.com/question/14476736
#SPJ1

3 0
1 year ago
add is a method that accepts two int arguments and returns their sum. Two int variables, euroSales and asiaSales, have already b
Oduvanchick [21]

Answer:

// here is code in Java.

// package

import java.util.*;

// class definition

class Main

{

   // method that return sum of two sale value

   public static int Add(int euroSales,int asiaSales)

   {

       // return the sum

       return euroSales+asiaSales;

   }

   //main method of the class

public static void main (String[] args) throws java.lang.Exception

{

   try{

    // variables

       int euroSales=100;

       int asiaSales=150;

       int eurasiaSales;

        // call the function

       eurasiaSales=Add(euroSales,asiaSales);

        // print the sum

       System.out.println("total sale is:"+eurasiaSales);

   }catch(Exception ex){

       return;}

}

}

Explanation:

Declare and initialize two variables "euroSales=100" and "asiaSales=150". Declare another variable eurasiaSales. Call the method Add() with euroSales and asiaSales as parameter. This method will add both the value and return the sum.This sum will be assigned to variable eurasiaSales.Then print the sum.

Output:

total sale is:250  

8 0
4 years ago
Other questions:
  • Peripherals can be used to input information. True False
    6·2 answers
  • 1. Why is it important to compare features of a computer before making a purchase?
    13·2 answers
  • Who is the owner of microsoft company​
    12·1 answer
  • write the structure of an email message ques.2 what do you mean by search engine? write its component .ques. 3 what are the adva
    9·1 answer
  • Which security control is most helpful in protecting against eavesdropping on wireless LAN (WLAN) data transmissions that would
    6·1 answer
  • When you open as many links as you want, and still stay in the same browser window instead of cluttering your screen with multip
    5·1 answer
  • (PYTHON) Write a program that uses this technique to read a CSV file such as the one given above. Display the IDs and names of t
    14·1 answer
  • Write out the base sequence that is added directly after the primer. In order for Moodle to correctly grade this question, write
    11·1 answer
  • Research and build a chroot jail that isolates ssh users who belong to the restrictssh group. (You will also need to create the
    9·1 answer
  • Anyone on ps4 willing to trade me a fennec or McClaren on rocket league?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!