1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
FinnZ [79.3K]
3 years ago
6

Write a program that asks the user to provide a word, validate that it is a word, and print the word.

Computers and Technology
1 answer:
natta225 [31]3 years ago
8 0

Answer:

be clearer. your question doesn't seem to be presented well

You might be interested in
What is the name of the "local user" account involved in the alleged actions (Hint: where in the file structure did you find the
Sunny_sXe [5.5K]

I will assume this is a windows computer

Answer:

  • Disk (Letter)\Users\<"Answer">\Folder\Documents\SuspiciousFile.exe
  • You can use Windows Security Logs to try and find out from what IP address the user you just found logged in from.

Explanation:

The windows user folder has folders that contain each users data, Using the file path of the suspicious file you can figure out which user is associated with the file.

Windows Security Logs collect data on logon attempts so when the user logs in their IP address should be collected in these log files.

8 0
3 years ago
Rainforests are not generally considered a source of _______. d.<br> none of the above
Alexus [3.1K]
Rainforests are generally considered a source of D. none of the above because you can get food, medicine and spices from rainforests. The plants in the rainforests have many medicinal properties.
5 0
4 years ago
What are the core components of a computer system?
Fantom [35]
CPU GPU harddrive ram
6 0
3 years ago
Which application software would be most suitable for writing a resume?
Gemiola [76]

Answer:

Either word or I would suggest using google docs and word and compare.

Explanation:

You can set up a resume in word.

7 0
3 years ago
Scott does not use privacy settings on his social media
likoan [24]

Answer:

ARREST HIM!!!

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • I have six nuts and six bolts. Exactly one nut goes with each bolt. The nuts are all different sizes, but it’s hard to compare t
    12·1 answer
  • Amelia has selected the chart in her PowerPoint and needs to change the chart type. Which one of the Chart Tools tabs would she
    15·1 answer
  • Assume that messages sent between two programs can be lost, duplicated, delayed, or delivered out of order. Design a protocol th
    9·1 answer
  • The replacer parameter of the stringify method accepts a/an ______________ or an array.
    15·1 answer
  • If you have created a document that contains a table that is 10 inches wide and 4 inches high, you will want to print the docume
    6·2 answers
  • PLEASE HELP FAST
    5·1 answer
  • Problem 4 (25 points)Consider a byte addressing architecture with 64-bit memory addresses.(a)Which bits of the address would be
    5·1 answer
  • What is the device that is non-volatile sometime called external memory?<br>​
    15·1 answer
  • In this screenshot, the circled item is the
    6·2 answers
  • Who is the primary audience for demonstrations of game prototypes made by the developer? A. Another developer B. The distributor
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!