1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fofino [41]
3 years ago
6

PLZ HELP QUICK! WORTH 25 POINTS!

Computers and Technology
2 answers:
soldi70 [24.7K]3 years ago
8 0

Answer: all but the very bottom one

Explanation:  the first four functions a function has to do something and the only one that does not do something is the very bottom

LenKa [72]3 years ago
6 0

Functions can have numeric parameters.

Functions can have string parameters.

Functions can have many parameters.

Functions can have no parameters.

I hope this helps!

You might be interested in
Some languages are traditional programming languages for developing applications; others, such as markup and scripting languages
pentagon [3]

Answer:

XML (Extensible Markup Language):

Explanation:

XML (Xtensible Markup Language):

It is a markup language that is used for creating web-pages, it defines a set of rules that makes it readable both to humans and machine.

XML was primarily designed to be a software and hardware independent tool and it's focus was on data.  XML provides a framework for defining markup languages.

XML, HTML and XHTML are all related to each other because they are all markup languages and can be used to build websites.

Basically,

-HTML is primarily for web-pages.

-XML is primarily for data.

-XHTML is a standard based on HTML that follows the strict rules of XML.

6 0
4 years ago
Which NSX feature would enhance their security so that this doesn’t happen again?
xz_007 [3.2K]

<em>NSX enhance logical switching, load balancing and microsegmentation which improves networking performance and operations.  </em>

<em>The performance starts in Layer 2, NSX manage routing even in virtual or cloud networks. Its firewall can support up to 20Gb traffic and monitoring all at once. Next work will in Layer 4 to 7, using SSL by making regular routine checks on network activities on this layer.  </em>

<em>As for security features, it uses microsegmentation which can make administrators manage policies of the network including making security groups.This would prevent previous attacks to happen again because NSX has firewalls that records and set policies in a network. </em>

<em />

7 0
3 years ago
What prefix describes a mass that is 1000 times smaller than a gram
yanalaym [24]
Milli as in milligram
4 0
3 years ago
Read 2 more answers
236. A system such as a printer, smart TV, or HVAC controller, typically uses an operating system on what is called a:
irakobra [83]

Answer:

Embedded System

5 0
2 years ago
Read 2 more answers
____ refers to driving around an area with a Wi-Fi-enabled device to find a Wi-Fi network in order to access and use it without
777dan777 [17]

 Answer:War driving

Explanation: War driving is the activity which is done for searching for the Wi-Fi connection while driving vehicle .The main purpose of the war driving is gaining and accessing the network of Wi-Fi by being in slowly moving vehicle. The act is carried out by the individual or more people.

Other options are incorrect because Wifi driving and Wifi finding are not technical words in the computer field and E-stalking is the stacking activity with the help of internet enables electronic devices.Thus, the correct option is war driving.

7 0
3 years ago
Read 2 more answers
Other questions:
  • Will mark brainliest if correct. First come, first serve.
    15·1 answer
  • Write a recursive function, len, that accepts a parameter that holds a string value, and returns the number of characters in the
    7·1 answer
  • Select the correct answer. Which sentence best describe an effective management strategy? A. Conceal game-related clippings prio
    12·2 answers
  • Because public key encryption requires the use of two different keys, it is also known as _____ encryption
    13·1 answer
  • You create a new three-way mirror storage space. You format the storage space by using ReFS. Which two features can you use on t
    13·1 answer
  • Write a program that reads in characters from standard input and outputs the number of times it sees an 'a' followed by the lett
    11·1 answer
  • When adding shapes to a presentation, the outline can be one color, and the fill must be the exact same color.
    12·2 answers
  • What is a router?
    9·1 answer
  • Pls help!!!!!!!!!!!!
    13·2 answers
  • When more open-ended questions are asked in a study group, discussions are more likely to
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!