1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lana71 [14]
3 years ago
12

Dadadadaddaaffafafasgag

Computers and Technology
1 answer:
skad [1K]3 years ago
7 0
Thanks for the points lol have a good day or night
You might be interested in
Loops are frequently used to ____; that is, to make sure it is meaningful and useful.
vitfil [10]

Loops are frequently used to<u> validate data </u>that is, to make sure it is meaningful and useful.

<h3>What are common blunders made by programmers in coding loops?</h3>

Forgetting to initialize and alter the loop control variable are common mistakes that programmers occasionally make. One set of instructions operates on multiple, separate sets of data. Initialized before joining a while loop.

<h3>What are the three steps that should occur in every loop?</h3>
  • Provide a starting value for the variable that will contain the loop.
  • Test the loop control variable to decide whether the loop body executes.
  • Alter the loop rule variable.

To learn more about Loops , refer

brainly.com/question/19344465

#SPJ4

4 0
2 years ago
You want to view a list of users on a linux system. what command should you use?
vredina [299]
Answer is A: cat /use/passwd
7 0
1 year ago
PLZZ HELP!!!
Serga [27]

Answer:

I don't know

Explanation:

with data you can access all things in the world

8 0
3 years ago
Alan wants to find an image of a car he can use in a presentation. What button should he click in the Images group to run a sear
maksim [4K]

Alan should click on the Clip Art section and then run a search by entering the keyword in the search menu.

A. Clip Art

<u>Explanation:</u>

Alan wants to find an image of a car that he can use in his presentation. It is always a good practice to include pictures and other media like videos, GIFs, and sound effects to make a presentation more engaging and interesting.

In order to include an image, Alan should click on the Clip Art section and then run a search by entering the keyword in the search menu. The clip art allows the user access to the saved images and to the internet for searching the required image.

3 0
3 years ago
To provide both encryption and integrity protection, wpa2 uses aes encryption with:
lara [203]

WPA 2 stands for Wi-Fi Protected Access, version 2. It is the latest protocol that effectively protects 802.11 wireless traffic across a LAN. It belongs to the 802.11 protocol.

To provide both encryption and integrity protection, wpa2 uses aes encryption with Counter and CBC MAC (CCM) Mode.

3 0
3 years ago
Other questions:
  • List 3 characteristics of the ideal encryption scheme
    6·2 answers
  • According to Holpp and Kelly's approaches to developing vision, the benchmarking approach is more internally focused, whereas th
    6·1 answer
  • A ___________ variable is declared outside all functions.
    15·1 answer
  • Renee's creating a plan for her business's information system. What should she do after she determines the goals for her busines
    10·1 answer
  • What was the first portable computer called and who made it?
    9·1 answer
  • When backing up a database, what is added to the file name?<br> On g metrix
    9·1 answer
  • When authenticating a user's password, the password supplied by the user is authenticated by comparing the ____ of the password
    11·1 answer
  • Consider the following import statement in Python, where statsmodels module is called in order to use the proportions_ztest meth
    10·1 answer
  • Which one of the statements best characterizes the current state of e-commerce?
    15·1 answer
  • What is ‘situational awareness” in game design?please answer in a full sentence!
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!