1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nasty-shy [4]
3 years ago
5

For the function below, which variables have the same scope?

Computers and Technology
2 answers:
steposvetlana [31]3 years ago
5 0

Answer:

numB and power

Explanation:

Correct answer edge 2020

Margarita [4]3 years ago
3 0

Answer:

numB والقوة

Explanation:

حافة الإجابة الصحيحة 2020

You might be interested in
Two users, UserA and UserB, are engaging in secure communication using only asymmetrical encryption. UserA needs to send a secur
umka21 [38]

Answer:

The correct answer is A: UserB sends UserA UserB's public key

Explanation:

In Asymmetrical Encryption, the both user involve in the secure communication must have a pair of key called public and private key. There are various step involves with engaging in Asymmetrical encryption, they include:

1. Each user generates a pair of keys to be used for the encryption and decryption of messages.

2. Each user places one of the two keys in a public register or other accessible file. This is the public key. The companion key is kept private.

3. If User B wishes to send a confidential message to User A, User B encrypts the message using User A's public key.

4. When User A receives the message, User A decrypts it using her private key. No other recipient can decrypt the message because only User A knows User A's private key.

Therefore, from the steps above, Option B and C are wrong because the private key/secret key should never be shared between users in asymmetrical encryption.

Option A is the correct answer as UserB sends UserA UserB's public key which is available to the everyone.

5 0
4 years ago
I have at least 20-30 typing entries on my keyboarding log <br><br><br> true or false
Alexxx [7]
You should check your keyboarding log, because I think it means it wants you to say how many entries you have!
7 0
4 years ago
The decimal system was invented by the ____ empire.
AnnZ [28]

Answer:

A. Gupta Empire

Explanation:

One of its accomplishments in mathematics, was the discovery of the decimal system and zero as a placeholder, based on the number 10 (similar to what we use nowadays). it was discovered by a mathematician and astronomer named Aryabhatta around 498 CE.

7 0
3 years ago
PLEASE HELP PROGRAMMING WILL GIVE BRAINLIEST
DaniilM [7]

Answer:

1. would be B.

2. would be D

3. May I ask if it can be multiple answers?

Explanation:

1. In coding a if statement has to follow if something is true or not. If we are talking about a if and then statement it will skip that block and move to the next block of the "then" part of the "if then" Statement if the first part is reported false

2. This is a easy one, so it has to be either a 3.25 GPA or higher or they have to have either 100 hours or more.

3. waiting for a comment back :)

4 0
4 years ago
What are the fundamental activities that are common to all software processes?
erica [24]

Answer:

There are some fundamental activities that are common to all software processes:

•Software specification. In this activity the functionality of the software and constraints on its operation must be defined.

•Software design and implementation. ...

•Software validation. ...

•Software evolution

7 0
3 years ago
Other questions:
  • If you like to interact with the game’s environment rather than with its inhabitants, which Bartle player type would you conform
    12·2 answers
  • The number of pixels displayed on the screen is known as ________.
    14·1 answer
  • Before a computer can store a real number in memory, it must be encoded in __________.
    14·1 answer
  • Assume that the type NAME has already been defined. Define a new type, SREC that is a structure consisting of two fields: name (
    5·1 answer
  • An ideal line length would include how many characters? A. 6570 B. 100 C. 100125 D. 4055
    8·1 answer
  • In C++ Please :
    6·1 answer
  • My sister put my phone in the microwave and I'm pretty sure the battery blew up. I'm too scared to open the microwave. What do I
    11·1 answer
  • What icons in the toolbar change the look of the presentation text? It’s either Drawing, Formatting,Presentation, or Standard
    9·2 answers
  • Mohammed’s parents learn that his classmates have begun sending him text messages making fun of his heritage. Mohammed says he’s
    5·2 answers
  • Language is Python
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!