1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yarga [219]
3 years ago
11

When power is completely removed from your computer

Computers and Technology
1 answer:
nekit [7.7K]3 years ago
6 0

Explanation:

The only way that would work is if you had access a very cold liquid such as liquid helium or liquid nitrogen.

You might be interested in
What is the maximum duration of daily Scrum meetings?
nikdorinn [45]

Answer:

15 minutes

Explanation:

this meeting is normally timeboxed to a maximum duration of 15 minutes.

3 0
3 years ago
An online service allows users to integrate their phonebook with their social media profiles and stores it on the cloud. The pho
Tasya [4]
A) Software as a Service (SaaS)

SaaS refers to full applications deployed in the cloud, whereas PaaS and IaaS refer to cloud services that allow for development of new applications with varying levels of hardware abstraction. IaaS usually refers to cloud Virtual Machines, and it allows more control over the types of computers used to run an application (Linux/Windows/RAM/CPUs/etc). PaaS is a set of minimum required components to make an application run, typically not visible to developers. Developers can write code and deploy to a PaaS service without configuring virtual machines or installing dependencies/Operating Systems.
6 0
3 years ago
John is writing a code instructing the character to move forward 10 steps, choose a number between 1 to 10, and if the number is
gladu [14]

Answer: bro im suck on the same thing

Explanation:

8 0
3 years ago
A radio and communications security repairer is responsible for both radio and satellite communication systems.
natita [175]
I'm almost certain the answer is true
3 0
3 years ago
Read 2 more answers
Swapping Order of Vowels Write a program to swap the order of the vowels in a given word. For example, if the word is programmin
Georgia [21]

Answer:

Program is as follow:

Explanation:

#include<iostream.h>

#include < conio.h>

bool isVowel(char b)

{

return

( b=='a' || b=='A' || b=='e' || b=='E' || b=='i' || b=='I' || b=='o' || b=='O' || b== 'u' || b=='U');

For swaoing the vowels

string reverseVowel ( String str)

{

int j = 0;

string v ;

for ( int i= 0 ; str [i]]!='0'; i++)

if( isv(str[i]))

v[j++] = str[i[;

for ( int i = 0; str[i]! = '0' ; i++

if ( isv (str[i]))

str{i} = v [--j]

return str;

}

int main ()

{ string str = " Programming";

cout<<swapv(str);

return 0 ;

}

7 0
3 years ago
Other questions:
  • Which class of fire extinguisher is appropriate for a fire involving electrical/energized electrical equipment?
    13·2 answers
  • What makes us see continuously moving images when still images appear in rapid succession
    11·1 answer
  • What is the definition of D1-D4?
    14·1 answer
  • A programmer, or software developer, is a person with the training and skills necessary to ____________ computer programs.
    13·1 answer
  • Write a JAVA program containing a method called hasEight(), which takes an int as input and returns true if the number contains
    14·1 answer
  • Now you are ready to implement a spell checker by using or quadratic. Given a document, your program should output all of the co
    15·1 answer
  • Ict quiz I attached a picture
    11·2 answers
  • Question 22 of 25
    10·1 answer
  • Use a slicer to filter the data in this table to show only rows where the Category value is Coffee or Meals
    9·1 answer
  • What type of attack occurs when the threat actor snoops and intercepts the digital data transmitted by the computer and resends
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!