1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VladimirAG [237]
3 years ago
13

क) मानौं तिमी बसेको समाजमा मान्छेहरूले सधै फोहर फाल्ने गर्नाले वातावरण प्रदूषित

Computers and Technology
1 answer:
Jet001 [13]3 years ago
6 0

Answer:

-..-..-.-....---.-..--

You might be interested in
associate true with the variable has_dups if the list list1 has any duplicate elements (that is if any element appears more than
nordsb [41]

True. If the list contains any elements that appear more than once, then it has duplicate elements and the variable has_dups is True.

What is variable?
Throughout computer programming, a variable is indeed a named container for a specific set of bits or type of data. A variable is indeed an abstract storage location with an associated symbolic name that holds some unidentified quantity of information made reference to as a value. Eventually, a memory address may be used to link or identify a variable. In addition to using the variable name or the variable itself, depending on circumstances, the stored value is typically referenced by the variable name. The name can be used independently of the precise information it represents thanks to the separation of name as well as content. During run time, a value can be bound to an identification number in computer source code.

To learn more about variable
brainly.com/question/29360094
#SPJ1

7 0
1 year ago
Lesson 1 (4.0 points)
sesenic [268]


3. Hold down the CTRL, ALT, and DELETE keys simultaneously, click Task Manager option, then right-click the frozen program's name, and finally click the end task button.


8 0
3 years ago
Read 2 more answers
Which component is in discreat type? A.power IC B.regular IC C.Resistor D.digital IC​
Finger [1]

Answer:

C. Resistor

Explanation:

A discrete component can be defined as any electronic component that are built as an individual or single unit.

Basically, a discrete component comprises of a single circuitry element, either an active element such as a vacuum tube, transistor etc or a passive element such as a resistor, diode, capacitor, inductor etc.

Hence, a discrete component is different from an integrated circuit (IC) or hybrid circuits because it is typically constructed or built with a single circuit element while integrated or hybrid circuits are constructed as a multiple unit.

Additionally, most discrete component are mainly semiconductors and as such consume large amounts of current.

5 0
3 years ago
Read 2 more answers
Input an int between 0 and 100 and print the numbers between it and 100, including the number itself and the number 100. If the
Murrr4er [49]

import java.util.Scanner;

public class JavaApplication42 {

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       int count = 0;

       System.out.println("Enter an integer between 0 and 100");

       int num = scan.nextInt();

       if (num <= 0 || num >= 100){

           System.out.println("error");

       }

       else{

           while(num <= 100){

               if (count == 20){

                   System.out.println("");

                   count = 0;

               }

               else{

                   System.out.print(num+" ");

                   count++;

                   num++;

               }

           }

       }

   }

   

}

I hope this helps!

6 0
3 years ago
Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities is also known as:
Nostrana [21]

Answer:

Zero-day exploits

Explanation:

Zero-day exploits refers to recently found vulnerabilities in a computer software program that has been in existence but was hitherto not known and addressed by the software security experts, however, these vulnerabilities were known to hackers. While the existence of these "loop-holes" in the software can go on unnoticed for several years, hackers can take advantage of it to cause harm to the computers' programs and data.

When these attacks occur, it is called a zero-day because the attack took place on the very day that the loop-hole was discovered in the software. So exploitation has already taken place before a fix is carried out.

5 0
3 years ago
Other questions:
  • Assume that word is a variable of type String that has been assigned a value. Assume furthermore that this value always contains
    13·2 answers
  • C++
    8·1 answer
  • Which of the following provides astronomical evidence for the age of the earth?
    11·1 answer
  • How long will twenty percent of battery life last me?
    14·2 answers
  • Your task is to write a C program that measures the latencies of various system calls. In particular, you want to know 1) the co
    5·1 answer
  • Describe the difference between the while loop and the do-while loop.
    7·1 answer
  • Most search engines provide specific pages on which you can search for____ and
    14·2 answers
  • PLEASE HELP <br> Which of the following best describes the existence of undecidable problems?
    7·1 answer
  • Help ne please!! Even if I press 3 times it doenst work.. when I try to turn it off either. Any suggestions? (using ipad)​
    5·1 answer
  • It's generally best to use what types of sites for factual internet research? Select all that apply from the choices below.
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!