1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mandarinka [93]
3 years ago
12

3

Computers and Technology
2 answers:
fiasKO [112]3 years ago
8 0

Answer:

the program stop running

kirza4 [7]3 years ago
3 0
The program stops running
You might be interested in
Why do some people think the global<br> economy is good for the United States?
maksim [4K]

Answer: is a

Explanation:

3 0
3 years ago
Which examples best demonstrate likely tasks for Logistics and Inventory Control workers? Check all that apply.
IgorLugansk [536]

Answer:

1,2,4

Explanation:

5 0
3 years ago
Read 2 more answers
Evaluate the benefits of a graduated driver license program for teenagers
poizon [28]

so teens can drive themselves places plus it makes sure you know what you are doing

8 0
3 years ago
During which phase of a hacker's five-step approach does the hacker scan a network to identify IP hosts, open ports, and service
bekas [8.4K]

Answer: Reconnaissance

Explanation:Reconnaissance is referred as the initial/primary phase in which the attacker/ hacker puts the every effort to gain the knowledge about the target that is collecting facts about the DNS data, network records, IP address, range of IP etc.

It is the initial step done by the attackers to do the preparation of the hacking.It is done by the two phases that is active phase and the passive phase.

3 0
4 years ago
Humor should never be used in a presentation as it will distract your audience.
Virty [35]
False, humor can be used to do many things including easing the audience into relaxation and trust.
8 0
3 years ago
Read 2 more answers
Other questions:
  • How many megabytes of data can a factory made audio cd hold?
    13·1 answer
  • What is the primary reason that companies use third party tracking cookies?
    12·1 answer
  • Fazer um programa em C++ que contenha 3 funções sendo:
    11·1 answer
  • IOS 0R ANDR0ID ???
    13·1 answer
  • What are QBASIC Operators ?​
    11·2 answers
  • Your customer then asks you if it would be worth the investment for him to have Ethernet cabling installed to reach each of his
    7·2 answers
  • Arrange the binary number in increasing order of their arithmetic output in the decimal number system ?
    9·1 answer
  • When a module is processed:
    6·1 answer
  • Re:
    15·1 answer
  • Implement a simplified version of a crypto broker platform. Initially, there is an array of users, with each user depositing onl
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!