1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adoni [48]
3 years ago
6

Edhesive 6.2

Computers and Technology
2 answers:
stich3 [128]3 years ago
8 0

Answer:

10

Explanation:

"for i in range (10):"

maw [93]3 years ago
4 0

Answer:

10

Explanation:

im good

You might be interested in
. An access specifier is one of three keywords:
Zolol [24]

Answer:

Access specifiers are used to control the visibility of members like classes, variables and methods. There are three access specifiers: public, private and protected. We shall see only about the public and private access specifiers for now. Protected access specifier comes into picture when inheritance is implemented. plz brainly me

Explanation:

8 0
3 years ago
A _____ is a collection of (potentially) thousands of computers that can respond to requests over a network
Rom4ik [11]

Answer:

server or supercomputer

Explanation:

5 0
2 years ago
How does a hard drive
stealth61 [152]
Your answer is incomplpete<span>Native Americans have lived there for thousands of years, long before ... On July 4, 1776, people from the thirteen colonies created the United States ... In the early 1800s, the new nation faced many controversial issues, such as slavery ..... the United Stateswould not become involved in a war the two countries were fighting ...</span>‎Pre-Columbian America - ‎Colonial America - ‎<span>American Revolution</span>
8 0
4 years ago
List and briefly describe the 3 types of software
erastovalidia [21]
1. A [disk cleanup] utility searches for and removes unnecessary files.
2. [Back-up] - allows users to copy selected files or an entire hard disk to another storage medium.
3. [Firefox] is a web browser- a platform, which is used to browse the information via the internet.
4 0
3 years ago
Context-based signatures match a pattern of activity based on the other activity around it, such as a port scan. true and false
valina [46]

Answer:

The given statement is "True".

Explanation:

  • Context-based signatures become wired networks on either the incoming packet's information. Documentation included within the IP headers has been used to stimulate a certificate or stamp based on the scenario.
  • The whole category of signatures examines congestion and how much it appears to fit through the other pedestrians which mostly surrounds it.

So that the above is the true answer.

7 0
3 years ago
Other questions:
  • The main circuit board in a computer is called the ________. RAM dongle motherboard power supply unit
    14·1 answer
  • Which are valid double statements for java? double a = 0; double b = -1.0; double c = -425; double d = 6340; double e = -1.0; do
    12·2 answers
  • ______was developed as an interim management protocol with OSI as the ultimate network management protocol.
    5·1 answer
  • What do computer viruses eat for snacks?
    7·2 answers
  • What is the main advantage of using DHCP? A. Allows you to manually set IP addresses B. Allows usage of static IP addresses C. L
    8·1 answer
  • A qué escala está dibujado el plano del Instituto si sabemos que la puerta principal de entrada tiene un ancho 3,40 metros y en
    14·1 answer
  • We _____to separate the code in sub programs from the main code<br><br> Please help!!
    10·2 answers
  • Pick one of the following scenarios and
    6·1 answer
  • I'm pretty sure most of you know squid game, right? Well, are the actors really dying? or is it just CGI or effects? Because it'
    5·2 answers
  • Rom a game design perspective, including some risks in your game can help make it both exciting and challenging, but also what e
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!