1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nikitich [7]
3 years ago
7

What does the following expression evaluate to?: "2 + 8"

Computers and Technology
1 answer:
lozanna [386]3 years ago
7 0
10 tell me if I’m wrong
You might be interested in
True or False. Over the past few years, the hacking community has engaged in more "lone wolf" types of hacking activities as opp
Bingel [31]

Answer:

False

Explanation:

Hackers usually perform their attacks in teams, the idea of a lone wolf hacker (single hacker) executing an attack isn't frequent, they work together and have their team names and they are known for their various attacks done for various reasons, reason can be political, business, competition, and so on.

8 0
3 years ago
Match each operating system drawback to its respective operating system.
Lena [83]

Answer:

Microsoft Windows - More susceptible to viruses

Linux - Limited support system

Apple - Fewer compatible applications

Explanation:

Generally windows is more susceptible to viruses.

Linux is open source meaning it's up to the community to help you.

Apple has been supporting more applications in these coming years but it still lacks the wide range of apps windows supports.

4 0
3 years ago
Read 2 more answers
What are important acronyms we use when we talk about the internet? this is for computer science.
vovangra [49]

Answer:

Lol

Brb

Btw

Gtg

Explanation:

I hope this helps

7 0
3 years ago
Two ways of calculating average returns are ______ and ______. Multiple select question. the arithmetic average the progressive
joja [24]

Answer:

"Geometric Average Return Example. Jennifer has invested $5,000 into a money market that earns 10% in year one, 6% in year two, and 2% in year three. If you were to calculate this using the arithmetic mean return, you would add the rates together and divide them by three, giving you an average of 6%."

Explanation:

6 0
2 years ago
A file is to be shared among different processes, each of which has a unique number. The file can be accessed simultaneously by
UkoKoshka [18]

Answer:

monitor fileSharer

{

       enum {THINKING, WAITING, READING} state[N];

       condition self[N];

       int total;

       void open(int i) {

               state[i] = WAITING;

               if (i + total >= N)

               { self[i].wait(); }  // Leaves monitor

               state[i] = READING;

               total += i;

       }

       void close(int i) {

               state[i] = THINKING;

               total -= i;

               // Can signal one waiting proc whose ID won't break bank.

               for (int x = N - total - 1; x >= 0; x--) {

                       if (state[x] == WAITING) {

                               self[x].signal(); break;

                       }

               }

       }

       initialization.code() {

               for (int i = 0; i < N; i++) {

                       state[i] = THINKING;

               }

               total = 0;

       }

}

8 0
4 years ago
Other questions:
  • Your bank offers to lend you $114,400 at an 8.5% annual interest rate to start your new business. The terms require you to amort
    11·1 answer
  • What is most likely kept in as database
    15·1 answer
  • _____ is the standard that enables wireless devices to access web-based information and services. world wide web tcp/ip ethernet
    5·1 answer
  • Describe business benefits of using wireless electricity?
    6·1 answer
  • Describe some ways that you personally use information technologies differently than you did just a few years ago
    11·1 answer
  • All of the following are aspects of the search process except
    8·1 answer
  • We cannot create a blank table true or false​
    8·1 answer
  • )what item is at the front of the list after these statements are executed?
    15·1 answer
  • What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?
    15·1 answer
  • Why transport layer is usingconnectionless services if network layer is providing connection oriented services?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!