1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cupoosta [38]
3 years ago
14

If you see these REPORT.

Computers and Technology
2 answers:
Olegator [25]3 years ago
5 0
Woah that’s scary- thanks for letting me know!
Alenkinab [10]3 years ago
3 0

Answer:

ok will do

Explanation:

You might be interested in
When network traffic is encrypted, it is invisible and its content and purpose are masked.
Olenka [21]

Answer:

true

Explanation:

encryption is when you scramble the contents of information

4 0
2 years ago
What does the KISS Principle stand for?
ivanzaharov [21]

Keep it simple stupid


7 0
3 years ago
Read 2 more answers
If you were driving the blue Prius in the situation pictured above, explain why the red Mustang should be given right-of-way at
raketka [301]

Answer:

The red Mustang should be given the right-of-way at this intersection because:

The red Mustang arrived first before the blue Prius and is closer to the stop sign before the arrival of the blue Prius.  This implies that the red Mustang must have waited for its turn, unlike the blue Prius that just arrived at the intersection.

Explanation:

Traffic laws, regulations, and IPDE defensive driving strategy require that drivers always give way to the vehicle that arrived before them at an intersection.   Assuming that multiple vehicles reach the intersection simultaneously, then the vehicle must be given the right-of-way.  Alternatively, the traffic lights at the intersection should be obeyed and be allowed to regulate the movement of vehicles.  IPDE defensive driving strategy requires drivers to be watchful of their driving spaces to determine the appropriate time to move.

8 0
3 years ago
Create a console application to keep track of contact information. Print the contacts of the address book in sorted order first
vaieri [72.5K]

Answer:

The code is written in C++ below with appropriate comments

Explanation:

#include <iostream>

#include <cstring>  //this takes care of the customer details

//that will be imputed into the program

using namespace std;

//using user-defined struct format to store contact details

struct Contact{

char FirstName [60]; //character string for first name

char LastName [60]; //character string for last name

char PhoneNumber [30]; //character string for phone number

//this takes care of cases where international format is used

char Email [40]; //character string for email

};

int main()

{

//case example for storing values of a contact called John

Contact John;

//strcpy is used to assign character strings

//to user-defined structs

strcpy(John.FirstName,"John");

strcpy(John.LastName, "Doe");

strcpy(John.PhoneNumber,"+1234567890");

strcpy(John.Email, "johndoe @ nomail . com");

//added spaces due to regulations

//this has stored the information of Joe

//printing the contact name

cout<<"The customer is:"<<John.LastName<<" "<<John.FirstName;

//prints out the last name then first name as given

//you can edit it for the desired customers

}

3 0
3 years ago
Select all phrases that describe a server-based network. centralized network security easy to expand log-ins controlled by centr
slamgirl [31]

Answer:

Client Server Network ... is the central computer that enables authorized users to access networked resources ... computers in this type of network are connected to a central hub ... why might a business choose a server based network (3) ... 2) easier to expand ... external hardware connected to and controlled by a computer.

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • Write a program that read first a user's given name followed by the user's age from standard input. Then use an ofstream object
    8·1 answer
  • Technician A says copper has a low resistance. Technician B says the length of wire doesn't affect resistance. Who is correct?
    11·1 answer
  • When a packet with the code is transmitted, it is received and processed by every machine on the network. this mode of operation
    12·1 answer
  • An audit trail is a record of how a transaction was handled from input through processing and output
    10·1 answer
  • Why have countries requested for the removal of content?
    6·1 answer
  • The length property of the String object returns
    15·1 answer
  • Which part of the operating system enables you to interact with the device? Question 9 options: The graphical user interface The
    8·1 answer
  • Type of file containing instructions that tell your computer how to perform ___
    9·1 answer
  • Question 1 of 10 Which type of information systems personnel are involved in organizing information so that users can access it
    7·1 answer
  • What are the cloud storage components
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!