1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Butoxors [25]
3 years ago
8

A ___________ variable is used to add up a set of values. fill in the blank

Computers and Technology
1 answer:
TEA [102]3 years ago
3 0

Answer:

dependent variable -- As it depends on the other variables, changes when they change

You might be interested in
You manage the IT department at a small startup Internet advertiser. You need to set up an inexpensive system that allows custom
PSYCHO15rus [73]

Answer:

Answer is extranet.

Refer below.

Explanation:

You manage the IT department at a small startup Internet advertiser. You need to set up an inexpensive system that allows customers to see real-time statistics such as views and click-throughs about their current banner ads. The type of system will most efficiently provide a solution is Extranet.

3 0
3 years ago
To enter a blank line into a document, press the ____ key without typing any text on the line.
Brilliant_brown [7]
You click the "enter" key found on the right side of most keyboards
7 0
3 years ago
55 POINTS, IN JAVA
ikadub [295]

public class JavaApplication82 {

   

   public static void main(String[] args) {

       

       for (int i = 1; i <= 9; i++){

           for (int w = 0; w < i; w++){

               System.out.print("*");

           }

           System.out.println("");

           

       }

   }

   

}

This works for me.

6 0
3 years ago
Why might your coworker suggest encrypting an archive file before e-mailing it??
Genrish500 [490]
Because to prevent MITD (Man in the middle is a man that in the middle of the network. For example: You are sending a text, the man in the middle or in the modem will receive the text and can edit it and send it to the receiver, or the man will put the virus in...) and to prevent server snooping
8 0
3 years ago
3 component of a computer
madam [21]

Answer:

Hardware

software

Humanware

6 0
4 years ago
Other questions:
  • A(n) _______ allows an attacker to use a network structure to send large volumes of packets to a victim.
    5·1 answer
  • A financial consulting firm recently recovered from some damaging incidents that were associated with malware installed via root
    6·1 answer
  • Charges of the opposite tend to repel each other.
    9·2 answers
  • Assume you had a .csv file with data already populated that you wanted to use for a mail merge. Which button would you press to
    8·1 answer
  • E-What is the important of Recycle bin?<br>Ans:​
    12·1 answer
  • In a dark place you have only a match , a twig , campfire logs , and oil lamp and a candle which do you literally first /
    15·1 answer
  • Is anyone a robIox moderator?
    13·2 answers
  • Another word for asking a question of your data is to _____ it.
    6·1 answer
  • Information should be________to ensure more than one source provides the same factual information. a. repeated c. cross-lined b.
    14·1 answer
  • What do you think is the most effective way to ensure that code adheres to good coding standards.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!