1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
asambeis [7]
3 years ago
6

What is technology in computer​

Computers and Technology
1 answer:
qaws [65]3 years ago
8 0

Answer:

she is right or he :)

Explanation:

You might be interested in
Which of the following is a unique feature of credit unions?
Alecsey [184]

A list of multiple answers is provided;

 

<span>a)      </span>Credit unions are typically owned and run by their members

<span>b)      </span>Credit unions limit membership to certain people or groups

<span>c)       </span>Credit unions offer a wide variety of banking services

<span>d)      </span>Both A & B

 

The answer is both (D) Both A & B

 

As compared to banks, credit unions are small in size and are created, owned and operated by their members or participants. They are non-for-profit financial cooperatives and are structured to serve a particular region. Thus, membership in majority of credit unions is that you have to live in the area. You may also be able to join based on other various factors like Employer and family.

6 0
3 years ago
How many iterations for each for-loop where max = 10 and incr = 3 a. for (int i = 0; i &lt; max; i++) b. for (int i = 0; i &lt;
LekaFEV [45]

Explanation:

Answer to the following iterations are:

a)

In the following for-loop, the loop will starts from 0 and end at 9.

for example:

0 1 2 3 4 5 6 7 8 9

So, the loop will iterate 0-9, which means 10 times.

b)

In the following for-loop, the loop will starts from 0 and end at 8 but in the gap of 2 because of the increment of 2 in the variable "i".

for example:

0 2 4 6 8

So, the loop will iterate even times or 5 times, which means 0 2 4 6 8.

c)

In the following for-loop, the loop will starts from 0 and end at 9 but in the gap of 3  because of the increment of 3 in the variable "i" and the value is assign in the variable "incr" is 3.

for example:

0 3 6 9

So, the loop will iterate 4 times, which means 0 3 6 9.

d)

In the following for-loop, the loop will starts from 3 and end at 9 but in the gap of 3  because of the increment of 3 in the variable "i" and the value is assign in the variable "incr" is 3.

for example:

3 6 9

So, the loop will iterate 3 times, which means 3 6 9.

e)

In the following for-loop, the loop will starts from 10 and end at 1 which means reverse order.

for example:

10 9 8 7 6 5 4 3 2 1

So, the loop will iterate 10-1, which means 10 times in reverse order.

f)

In the following for-loop, the loop will not works because of the condition which is i is less than 0 but in the following code loop will starts from 3.

So, that's why loop will not iterate.

g)

In the following for-loop, the loop will starts from 1 and end at 9 but in the multiple of 3  because the variable "i" will multiply by the variable "incr" and the value is assign in the variable "incr" is 3.

for example:

1 3 9

So, the loop will iterate 3 times, which means 1 3 9.

h)

In the following for-loop, the loop is the infinite loop because of the condition which is i is less than max but and the loop will starts from 0 and goes on infinite times.

So, that's why it is the infinite loop.

4 0
3 years ago
Orphaned data is also created by the way that the hard drive allocates space on the hard drive for information that the user wan
Anika [276]
It think the answer to that question maybe true
8 0
3 years ago
Who are the founders of the video-sharing site Blip?
rewona [7]

the Founders would be Justin Day


3 0
4 years ago
Which security procedure is being demonstrated if an administrator is using Wireshark to watch for specific inbound and outbound
defon

Answer:

The correct answer to the following question will be Option C (Firewall monitoring).

Explanation:

Firewall monitoring would be the analysis of essential firewall parameters that play a key role throughout the effective operation of firewalls.

Usually, management of the firewalls should include:

  • Monitoring the firewall file.
  • Management of the firewall statute.
  • Monitoring the design of the firewall.

Firewall security control is shown if the user uses Wire-shark to track relevant incoming and outgoing traffic.

Therefore, Option C is the right answer.

4 0
3 years ago
Other questions:
  • How does a combustion engine works?
    7·2 answers
  • A rich text format (RTF) provides an electronic image of a document and can be viewed, printed, and electronically transmitted.
    7·1 answer
  • 40 POINTS I NEED THESE ANSWERS ASAP GIVE ME THE RIGHT ASNWER AND ILL PUT YOU AS THE BRAINLIEST
    13·1 answer
  • 1. An auto repair shop charges as follows. Inspecting the vehicle costs $75. If no work needs to be done,
    9·1 answer
  • Which of the following refers to the data analysis software and interactive software that allow managers to conduct analyses and
    6·1 answer
  • Please I need help with this !!!! <br> Complete the table given below.
    8·1 answer
  • __________ intelligence is an approach to boundary spanning which results from using sophisticated software to search through in
    15·1 answer
  • Which is a characteristic of multimedia systems?
    7·1 answer
  • Any one have a snnaap chhhaatt if so i need help with something n there
    15·2 answers
  • When an instruction is sent to the CPU in a binary pattern, how does the CPU know what instruction the pattern means
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!