1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sladkaya [172]
3 years ago
7

Tipos de lenguajes relacionados con c++?

Computers and Technology
1 answer:
Ber [7]3 years ago
3 0

Answer:

Programación Java, Programación Python, Ruby

Explanation: Porque ellas son ...

You might be interested in
Which one of these is the most commonly used hardware interface for attaching peripherals to a microcomputer?
Tanzania [10]
Hey there!

The most commonly used hardware interface for attaching peripherals to a microcomputer is the universal series bus, or USB, port. Many computers have at least 2 to 4 USB ports that allow for multiple devices to be plugged in at once. In terms of wired devices as opposed to wireless, this is the main way that a mouse, a keyboard, a smartphone (for charging and syncing information), and many other devices are connected to computers. 

Hope this helped you out! :-)
4 0
3 years ago
Select the correct answer.
Vedmedyk [2.9K]
D because of the sun
6 0
3 years ago
Which act requires enterprises to guard protected health information and implement policies and procedures to safeguard it?
bogdanovich [222]

Answer:

D. HIPAA (Health Insurance Portability and Accountability Act)

Explanation:

HIPAA which stands for Health Insurance Portability and Accountability Act, is an act designed by the US government in 1996 to guard patients' confidential health information and also implement policies and procedures to safeguard it. The act contains the required information and instruction for handling patients' medical health information. The law however gives patients (or their representatives) the right to access these information which as a matter of fact must be made available within 30 days from the day of request.

PS: Not sure why the option D in the question contains ' FTF '. I have taken it to be a typo because without it, the option is in itself complete.

7 0
3 years ago
can I do all my work in a notebook with Penn foster or do I have to type all of the answers in that little box?
dusya [7]
Um whichever is better for you! ummm whats the point of this question?
5 0
3 years ago
Read 2 more answers
What princple of animation is used to animate the movements of the arms of the following character while walking?
Gala2k [10]

Answer:

arc

Explanation:

4 0
3 years ago
Other questions:
  • Describe the following software process models using your own words .Your explanation should also provide an example of a softwa
    12·1 answer
  • Minimalism is a major movement in postmodern art. O True O False
    14·1 answer
  • How to write a function that counts the letters in a string in C?
    13·1 answer
  • Which of the following attack is a threat to confidentiality?
    10·1 answer
  • _____ involves storing data and running applications outside the company’s firewall. answer grid computing parallel computing cl
    11·1 answer
  • A circuit breaker will do which of the following
    12·1 answer
  • The metric unit used for length
    5·1 answer
  • Which option allows users to access the handout master to modify it?
    13·2 answers
  • The advancement of technology in our daily lives has changed how we interact with the world.
    10·1 answer
  • When adding a component to a container with the ____ layout, specify the NORTH, EAST, SOUTH, WEST, or CENTER position.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!