1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ikadub [295]
3 years ago
12

Select the correct answer.

Computers and Technology
1 answer:
Naya [18.7K]3 years ago
6 0

Answer:

The correct answer is: Option OD: function

Explanation:

Many programming languages use functions to make the coding simple and easy to understand. A function is like a small unit that takes input in the form of arguments or parameters, does the processing on the input and returns the output.

Hence,

The correct answer is: Option OD: function

You might be interested in
Judy is searching for files with a .jpg file extension on her laptop. Which type of file is she looking for?
nikklg [1K]
<span>JPEG files </span><span> are a common file format for digital photos and other digital graphics so she would be looking for a picture

</span>
6 0
3 years ago
Read 2 more answers
I need help, help me please ..​
Leona [35]

Answer:

1. cookies

2.domain name

3.web browser as web saver name

4.html

Explanation:

sana makatulong

4 0
3 years ago
The author of ""Cyber-psychopathy: What Goes On in a Hacker’s Head"" states that a crucial component of computer hacking lies in
slega [8]

Answer: The statement implies that the hackers psychologically manipulate the human to access the information they need.

Explanation: The author states that the hacker does not only exploits technology to get system access or to gather information. But there is another pivotal part of hacking. He refers to this part as "social engineering".

Social engineering from information security perspective means manipulate human emotions and convincing them to disclose some confidential information. Hacker often hacks or defrauds after gaining confidence and trust of a person.

Phishing is an example. It is a fraudulent technique for getting some secret information. Phisher sends an email pretending to be from some reputable organization to persuade people to divulge private information like passwords and credit card numbers, ATM card pin etc.

5 0
3 years ago
Which mechanisms do we use to transport binary data and memory addresses?
Sav [38]

Answer:

The External Data Bus  is used to transport binary data and Address bus is used to transport memory addresses.

Explanation:

  • External Data Bus is a combination of data bus and external bus. Data bus is used to carry data and instructions between two or more components in the system e.g. CPU and all other computer components.
  • External bus is also called expansion bus. It is used to connect external components to the computer. Its a communication medium between CPU and other components. These components can be peripheral device like USB or flash memory.
  • So External Data Bus is used to transport data between CPU and external components. It is a primary communication pathway for data in a computer. The external data components are connected to this bus and the instruction or data on this bus is available to all external components. But the data communication is slower as compared to that of internal bus.
  • Address Bus carries physical location or address of data and transports memory addresses. Processor uses address bus when it wants to read data from memory or write data to the memory by sending a read/write signal by placing the read/write address of the specific memory location on the address bus.

 

6 0
4 years ago
Print either "Fruit", "Drink", or "Unknown" (followed by a newline) depending on the value of userItem. Print "Unknown" (followe
vagabundo [1.1K]

Answer:

I am writing a C++ program. Let me know if you want the program in some other programming language. Here is the portion of the code:

if((userItem == GR_APPLES) || (userItem == GR_BANANAS)){

 cout << "Fruit";   }

else if((userItem == GR_JUICE) || (userItem == GR_WATER)){

 cout << "Drink";  }

else{

 cout << "Unknown";  }  

cout << endl;

 

Explanation:

The IF statement is used to check the defined options with the value in the userItem.

If the value of the userItem is GR_APPLES OR GR_BANANAS then Fruit is printed as the output. || represents a logical operator OR so this means that userItem can be either the GR_APPLES or GR_BANANAS for the If condition to evaluate to true.

If the above condition evaluates to false then the else-if part will be checked next. So the else if checks if the value in the userItem is GR_JUICE or GR_WATER. If userItem contains either of these two then Drink is displayed on the screen as output.

If the else-if statement also evaluates to false then the else part is executed which displays Unknown.

The cout<< endl; statement in the last is used to print the new line. For example if the output is Unknown then it is followed by a new line.

In the given program userItem is set to GR_APPLES

GroceryItem userItem = GR_APPLES

So the output of the whole program is Fruit followed by a new line.

The screenshot of the code along with the output is attached.

7 0
4 years ago
Other questions:
  • ​What file system below does not support encryption, file based compression, and disk quotas, but does support extremely large v
    10·1 answer
  • The technology Herman Hollerith created in the 1880s began the modern-day data processing function in computers.
    9·1 answer
  • You are consulting for a trucking company that does a large amount ofbusiness shipping packages between New York and Boston. The
    5·1 answer
  • How do u make a bored builder
    8·2 answers
  • Write a method drivingCost() with input parameters drivenMiles, milesPerGallon, and dollarsPerGallon, that returns the dollar co
    12·1 answer
  • Guys for those who are familiar to bubble gum sim...THERE IS A HUGE EVENT AND I DONT WANT TO FAIL AN EVENT...(again) is anyone w
    9·1 answer
  • What should be included in research for a problem statement? Select all that apply
    13·2 answers
  • The following are three possible logon scenarios. Explain why option (c) below is preferable in terms of system security. a. Wel
    12·1 answer
  • Please help ASAP !!!
    15·1 answer
  • Void printInfo()
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!