1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vladimir1956 [14]
3 years ago
10

What is ur favorte star wars person?

Computers and Technology
2 answers:
aleksley [76]3 years ago
7 0

Answer:

Hi, mi favorite is Darth Vader maybe °-°

andreev551 [17]3 years ago
6 0

Answer:

This is hard because there are SOOOO many from comics, movies, video games, and shows.

I'm gonna go with commander wolfe or captain rex. And yes wolfe is spelled like that.

Explanation:

You might be interested in
A honeypot is sometimes called a(n) __________.
Masteriza [31]

Answer:

C. digital sandbox.

Explanation:

A honeypot is a security mechanism that creates a virtual trap to lure attackers. An intentionally compromised computer system allows attackers to exploit vulnerabilities so you can study them to improve your security policies. You can apply a honeypot to any computing resource from software and networks to file servers and routers.

4 0
3 years ago
It's inventiveness uncertainty and futuristic ideas typically deals with science and technology ......what is it.
marshall27 [118]

Answer:

Necessity is the mother of invention, technology is a tool to aid invention, and science is exploratory means to new ideas and information to approach our future with preparedness.All are necessary and need to be balanced and scrutinised.

Explanation:

5 0
3 years ago
In which country did the World Cyber Games originate?
levacccp [35]
The world cyber games originated in South Korea.
8 0
4 years ago
Read 2 more answers
In a(n) ____, the programmer uses a programming language (in context free grammar) to tell the computer what to accomplish and h
Mamont248 [21]

A 5GL fifth-generation languages a programming language design to solve given problem without programmer. The user only needs to solve the problem and condition without implementing an algorithm.

Explanation:

First Generation Language

The first generation language is called low- level style because they were used at a superficial level of abstraction. First-generation language referred to as the native language.

Second Generation Language

The second-generation language is also low-level language or assembly language. The second level of language uses the concept of mnemonics for the writing program. Symbolic name are used.

Third Generation Language

The third-generation language overcomes the first and second-generation languages. Third generation language is considered as high- level language because the target is to focus on the logic of the program.

Fourth Generation Language

The language of generation required a lot of time and effort that affect programmers.The fourth-generation was developed to reduce the time, cost, and effort.

Fifth Generation Language

The programming language of this generation focuses on constraints programming. The fifth-generation programming languages are Artificial Intelligence and Artificial Neural Network.

6 0
3 years ago
A(n) __________ is a common list operation used in programming. its purpose is to iterate through a list of items, one item at a
Nataliya [291]
I would say C- Priority List.
I hope this helps! :)
5 0
3 years ago
Other questions:
  • 2. a. Write pseudocode for a divide-and-conquer algorithm for finding valuesof both the largest and smallest elements in an arra
    11·1 answer
  • A ________ -tier design includes a middle layer between the client and server that processes the client requests and translates
    11·1 answer
  • Controls that are used to assess whether anything went wrong, such as unauthorized access attempts, are called ________ controls
    5·2 answers
  • What is an identifier? Give an example of an identifier.
    13·1 answer
  • Which remote access configuration option should you choose if you want mobile users to be able to make a secure connection to th
    9·2 answers
  • What component is most likely to be installed in a PC, is considered primary storage, and typically stores the operating system,
    6·1 answer
  • How does color affect your mood?
    11·2 answers
  • As a general rule, what is the size of a brochure?
    11·1 answer
  • How do i code........​
    6·2 answers
  • DOES ANYONE KNOW COMPUTER SCIENCE?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!