1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lera25 [3.4K]
3 years ago
12

Find out the names of at least 20 programming languages and their developers.

Computers and Technology
2 answers:
arlik [135]3 years ago
6 0

Answer:

lala

Explanation:

Yakvenalex [24]3 years ago
3 0
I don’t understand da question
You might be interested in
"The effectiveness of memory retrieval is directly related to the similarity of cues present when the memory was encoded to the
alexdok [17]

Answer:

D

Explanation:

Cause You Have To Decode It To Get To The Memory In The First Place

3 0
3 years ago
Physical Geography of the Middle East
vagabundo [1.1K]

Answer:

Explanation:

He’s wright SS7G5 The student will locate selected features in

Southwestern Asia (Middle East).

a. Locate on a world and regional political-physical map:

Euphrates River, Jordan River, Tigris River, Suez Canal,

Persian Gulf, Strait of Hormuz, Arabian Sea, Red Sea, and

Gaza Strip.

b. Locate on a world and regional political-physical map the

nations of Afghanistan, Iran, Iraq, Israel, Saudi Arabia, and

Turkey

3 0
3 years ago
Write a statement that adds 1 to the variable reverseDrivers if the variable speed is less than 0,adds 1 to the variable parkedD
Elina [12.6K]

Answer:

if speed < 0:

 reverseDrivers +=1

elif speed < 1:

 parkedDrivers +=1

elif speed < 40:

 slowDrivers +=1

elif speed<=65:

 safeDrivers +=1

else:

 speeder +=1

Explanation:

The statements are written in python programming language

See a complete code screenshot attached, where all the variables are defined

8 0
3 years ago
What wireless security technology contains significant flaws and should never be used?
aalyn [17]

The wireless security technology contains significant flaws and should never be used is Wired Equivalent Privacy (WEP).

<h3>What is the primary weakness of Wired Equivalent Privacy WEP )?</h3>

Wired Equivalent Privacy (WEP) is known to be a kind of a security protocol, that is seen in the IEEE Wireless Fidelity (Wi-Fi) standard known to be 802.11b.

Note that the primary weakness of wired equivalent privacy (WEP) is that It functions only on some given brands of APs and as such, The wireless security technology contains significant flaws and should never be used is Wired Equivalent Privacy (WEP).

Learn more about wireless security from

brainly.com/question/25633298

#SPJ1

5 0
1 year ago
What is the letter for the trash directory on windows 10?
myrzilka [38]
It's usually in C: drive.
<span>C:\$Recycle.Bin
</span>But if you have several drives, there are Recycle Bins each drive.
3 0
3 years ago
Read 2 more answers
Other questions:
  • Name some technologies that engineers create
    13·1 answer
  • True or false.the color attribute cannot recognized the hexadecimal code.
    7·2 answers
  • Suppose the file is sent continuously as one big message. how long does it take to send the file, assuming it is sent continuous
    15·1 answer
  • Patricia is leading an online group of students from many
    8·2 answers
  • When working on developing an ability, it is important to get feedback to know how you are doing.
    6·1 answer
  • Assuming the Direct Hashing function and the Subtraction preprocessing algorithm is used to map keys into indices, give the inde
    15·1 answer
  • A string with delimiters can be parsed into separate fields using the _____ class.
    8·1 answer
  • What is first page of website called​
    10·1 answer
  • Do u have all the subjects​
    12·2 answers
  • Trace the evaluation of the following expressions, and give their resulting values. Make sure to give a value of the appropriate
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!