1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anzhelika [568]
2 years ago
6

Consider the following code segments that are potential replacements for /* missing code */.

Computers and Technology
1 answer:
tankabanditka [31]2 years ago
8 0

Answer:

C. I and III only.

Explanation:

The segment code is text portion of the document of file. It contains executable instructions for the system. The temperature value increase is replaced by instructions which create the same output.

You might be interested in
Give at least five (5) practices that you must observe in your classroom.​
atroni [7]

Answer:

Offer second chances/clean slates.

Be resourceful.

Make learning active.

Be an advocate.

Pursue lifelong learning.

8 0
3 years ago
Read 2 more answers
A flashlight bulb uses 2.4 W of power when the current in the bulb is 0.8 A. What is the voltage difference?
Alinara [238K]

Answer:

3 Volts.

Explanation:

4 0
3 years ago
Read 2 more answers
Mezcla de una señal con otra para facilitar su transporte o transmisión.
Brrunno [24]

Answer:

telecomunicaciones

Explanation:

6 0
3 years ago
Suppose there are 10 computers on a network that are configured to share a few printers and a single document folder. The compan
ivanzaharov [21]

Answer:

B- Workgroup model

Explanation:

A workgroup model can be defined as a process which enables system to be peer together in order to access the resources shared like files and printers at the same time.

In work group microsoft operating systems tend to share files, printers, and even Internet connection among them which is why work group is important especially in a place in which their are various computers with limited files and printer or internet connection.

4 0
3 years ago
With working from home now becoming a norm what is an effective network for an organization to secure its internal resources acc
Umnica [9.8K]

Answer:

Always encrypt data never store anything in plain text someone could use wireshark to pull out a data packet and if the data is not encrypted, expect things to happen.

4 0
2 years ago
Other questions:
  • ​to prevent intrusions, companies install combinations of hardware and software called _____ to keep unauthorized web users from
    9·1 answer
  • You are the administrator for the contoso.com website. recently, the server hosting the website had a failure that caused it to
    13·1 answer
  • You want to divide the value in cell D3 by the value in cell E3. Which formula should you use?
    11·2 answers
  • Define the following term. data, database, DBMS, database system, data- base catalog, program-data independence, user wen', DBA,
    12·1 answer
  • Which tools are found in the Quick Analysis feature? Check all that apply.
    14·2 answers
  • Letter only ^_____^!
    8·1 answer
  • In computer science, what is the name for a series of steps used to solve a problem?
    5·1 answer
  • A column does not consist of
    10·1 answer
  • How to unlock your iphone when you forgot the password?.
    15·1 answer
  • A government agency is getting rid of older workstations. The agency will donate these workstations, along with other excess com
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!