1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Karolina [17]
3 years ago
14

Critique and rank four different brands of antivirus software, rating them by price, functionality, and system requirements. Pre

pare a report that lists your choices and the reasons why you rated and ranked them in the suggested order.
Computers and Technology
1 answer:
scoundrel [369]3 years ago
5 0

Answer:

Explanation:yes it's true bc you need to order them bye what they are and hope this is right of it isn't I'm truly sorry

You might be interested in
Which example best demonstrates an impact of computers on health care?
Dennis_Churaev [7]
B-Robotic surgery allows surgeons to make smaller incisions.

Explaination: Anything having to do with medical procedures are healthcare so this is my reasoning.
4 0
3 years ago
Read 2 more answers
5.23 LAB: Contains the character
torisob [31]

Answer:

In C++:

#include<iostream>

#include<vector>

using namespace std;

int main() {

int len;

cout<<"Length: ";  cin>>len;

string inpt;

vector<string> vect;

for(int i =0;i<len;i++){

  cin>>inpt;

  vect.push_back(inpt); }

char ch;

cout<<"Input char: ";  cin>>ch;  

for(int i =0;i<len;i++){

  size_t found = vect.at(i).find(ch);  

      if (found != string::npos){

          cout<<vect.at(i)<<" ";

          i++;

      }

}  

return 0;

}

Explanation:

This declares the length of vector as integer

int len;

This prompts the user for length

cout<<"Length: ";  cin>>len;

This declares input as string

string inpt;

This declares string vector

vector<string> vect;

The following iteration gets input into the vector

for(int i =0;i<len;i++){

  cin>>inpt;

  vect.push_back(inpt); }

This declares ch as character

char ch;

This prompts the user for character

cout<<"Input char: ";  cin>>ch;  

The following iterates through the vector

for(int i =0;i<len;i++){

This checks if vector element contains the character

  size_t found = vect.at(i).find(ch);  

If found:

      if (found != string::npos){

Print out the vector element

          cout<<vect.at(i)<<" ";

And move to the next vector element

          i++;

      }

}  

7 0
2 years ago
Text that is positioned at the top of a column and labels the<br> column.
Vanyuwa [196]

Answer:

column header

Explanation:

3 0
3 years ago
Corinne is taking a chemistry class in college. A lab assignment asks students to track the melting point of ten different subst
Dmitrij [34]

Answer:

a spreadsheet

Explanation:

The data is of statistical type and is experimentally based. And hence, the spreadsheet is the best kind of software that can be used to register the record. And we can save 10 such experient results with the same format of tables on 10 different worksheets, and if we want we can adjust the readings of the 10 similar experiments at one time. And hence, we can quite effectively record as well as analyze this data on the spreadsheet. Hence, the spreadsheet is the correct option.

4 0
3 years ago
Assume that x is a char variable that has been declared and already given a value. Write an expression whose value is true if an
Oksanka [162]

Answer:

The expression in python is: x.isdigit()

Explanation:

Given

Character variable x

Required

Expression that evaluates if x is decimal or not

The expression in python is: x.isdigit()

If x is digit 0 - 9, x.isdigit() will equal True

Otherwise, it will equal False

8 0
3 years ago
Other questions:
  • How does a Computer chip work?
    6·2 answers
  • Do most of you agree on a primary interpretation? Why?
    14·1 answer
  • ACL 1 has three statements, in the following order, with address and wildcard mask values as follows: 1.0.0.0 0.255.255.255, 1.1
    6·1 answer
  • Witch of the following is a malicious program that can replicate and spread from computer to computer?
    13·1 answer
  • A non technical kind of cyber intrusion that relies heavily on human interaction and often involve tricking people into breaking
    5·1 answer
  • You just settled in for some study time at the local coffee shop, and you pause long enough to connect your smartphone to the Wi
    7·1 answer
  • A stock transfer from a storage bin in one warehouse to a storage bin in another warehouse is a possible scenario under which wa
    5·1 answer
  • Prepare algorithm and draw a corresponding flowchart to compute the mean value of all odd numbers between 1 and 100 inclusive.​
    10·1 answer
  • T.L.E
    6·1 answer
  • A radio and communications security repairer is responsible for both radio and satellite communication systems.
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!