1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vladimir1956 [14]
3 years ago
13

Npesta kenos reaction

Computers and Technology
2 answers:
Arturiano [62]3 years ago
7 0
What are you asking???
Ksenya-84 [330]3 years ago
6 0

Answer:

? what's the question

Explanation:

???

You might be interested in
3. Which swim_backwards method is called when sammy.swim_backwards() is executed? Why?
Georgia [21]
Classes called child classes or subclasses inherit methods and variables
4 0
3 years ago
Which one you choosing? PS5 OR THE XBOX SERIES X???
love history [14]

Answer:

PS5

Explanation:

It gooder

3 0
3 years ago
Read 2 more answers
What are some of the other operations that might be implemented for a stack?
melomori [17]

Answer:

push, pop, top, clear

Explanation:

push: add a new value

pop: remove and return top value

top: return top value without removing

clear: remove all values

6 0
3 years ago
Bluetooth, 3G, and WiMAX are examples of _____. Wireless LANs and public hotspots use ____ technology to connect to the Internet
Vlada [557]

Answer:

1. Network standards.

2. Wi-Fi

3. LTE.

4. NIC.

5. HomePNA.

Explanation:

1. Bluetooth, 3G, and WiMAX are examples of network standards.

2. Wireless local area networks (LANs) and public hotspots use Wi-Fi technology to connect to the Internet.

3. LTE is a newer standard for cell network communications. LTE is an acronym for long term evolution.

4. Your computer needs a NIC to access a network. NIC is an acronym for network interface card.

5. HomePNA allows computers to be networked through ordinary telephone wires. HomePNA is the abbreviation for Home Phoneline Networking Association.

3 0
3 years ago
Write a program that encrypts and decrypts a string of characters. Use a char array for this, not the string class. The maximum
dem82 [27]

Answer:

C++ code for encryption is given below

Explanation:

#include <iostream>

using namespace std;

//functions to encrypt and decrypt

void encrypt(char str[]);

void decrypt(char str[]);

int main(){

char str[200];

bool done = false;

while(!done){

cout << "Enter a string (enter * to stop): ";

cin.getline(str, 200);

if(str[0] == '*' && str[1] == '\0')

done = true;

else{

encrypt(str);

cout << "Encrypted: " << str << endl;

decrypt(str);

cout << "Decrypted: " << str << endl;

}

cout << endl;

}

}

void encrypt(char str[]){

int i = 1;

for(int j = 0; str[j] != '\0'; j++){

str[j] += i;

i++;

if(i == 11)

i = 1;

}

}

void decrypt(char str[]){

int i = 1;

for(int j = 0; str[j] != '\0'; j++){

str[j] -= i;

i++;

if(i == 11)

i = 1;

}

}

3 0
3 years ago
Other questions:
  • What is the purpose of the backoff on Ethernet networks?
    5·1 answer
  • What is the software that finds websites, webpages, images, and other information called?search applicationsubject directorysubj
    5·2 answers
  • One of the network printers is producing copies where the toner is smeared on paper after printing. What component should be che
    11·1 answer
  • Write a program to define a variable size array, ask the user to enter the size of array and its elements. Then search whether a
    6·1 answer
  • PLEASE ANSWER
    9·1 answer
  • Which of the following is not System Software?
    5·1 answer
  • What is a feature of Print Preview?
    12·1 answer
  • What is the total running time of counting from 1 to n in binary if the time needed to add 1 to the current number i is proporti
    5·1 answer
  • Edhesive code practice 6.3
    14·2 answers
  • How does one decide which businesses to invest in.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!