1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
spayn [35]
3 years ago
12

8.10 quiz edhesive A swap is: a variable used to find the smallest value in an array an algorithm used to find a value in an arr

ay an algorithm exchanging two values stored in variables a variable whose purpose is short-lived, usually to hold temporary data that will soon be discarded
Computers and Technology
1 answer:
zmey [24]3 years ago
8 0

Answer:

A swap is: an algorithm exchanging two values stored in variables

Explanation:

I just did it and got it right

You might be interested in
قواعد البيانات الموزعه​
Monica [59]

Answer:

Translation : Distributed Databases

Explanation:

6 0
4 years ago
7. Explain the steps for formatting a shape ?
alisha [4.7K]

Answer:

To begin, select the shapes you want to format. To select more than one, press and hold the Shift key. When you select one or more shapes, a new Drawing Tools tab appears. Here, you can select Shape Fill to fill the selected shapes with a solid color, gradient, texture, or picture.

Explanation:

3 0
3 years ago
Help me..and thank you​
kotykmax [81]

Answer:

#include <stdio.h>

void spaces(int n) {

 for(int i=0; i<n; i++) {

   putchar(' ');

 }

}

void numbersdown(int n) {

 for(int i=n; i>1; i--) {

   putchar('0'+i);

 }

}

void numbersup(int n) {

 for(int i=1; i<=n; i++) {

   putchar('0'+i);

 }

 putchar('\n');

}

int main(void) {

 int number;

 printf("Please enter a digit: ");

 scanf("%d", &number);

 for(int i=number; i>0; i--)

 {

   spaces(number-i);

   numbersdown(i);  

   numbersup(i);    

 }

}

Explanation:

I deliberately separated the solution into different functions for readability. If needed, the code could be made much more compact.

7 0
3 years ago
Devices such as monitors and printers that are connected to a computer are called ________.
eimsori [14]
Those are referred to peripherals.
4 0
3 years ago
In an attack known as ____, valid protocol packets exploit poorly configured dns servers to inject false information to corrupt
ra1l [238]
The answer is DNS Cache Poisoning

Also known as DNS spoofing, this is a type of attack that exploits the Domain Name System to divert traffic away to legitimate servers. It inserts corrupt data into the cache database of the DNS server. In this attack, a hacker sends forged responses from an imposter DNS with an intention to reroute a domain name to a new IP address. This new IP is almost always controlled by the hacker.

       




6 0
4 years ago
Other questions:
  • What means can a worm use to access remote systems to propagate?
    7·1 answer
  • 1. Reference initials are always typed on a business letter.
    6·1 answer
  • The power we use at home has a frequency of 60 HZ. What is the time period of such a power?
    10·1 answer
  • Below is the prototype for a function that takes two pointers to integer variables as its parameters. The purpose of the functio
    14·1 answer
  • Seven Features of computer aids design software
    6·1 answer
  • What do you use to put information into a computer?
    9·2 answers
  • Use the function random.randint to write a program that rolls a 6-sided die 100 times, and prints out all of the rolls.
    8·1 answer
  • Which is the correct notation to specify the following inheritance?
    8·1 answer
  • Use the round function to modify the program to display at most two digits of precision in the output number.
    14·1 answer
  • A _______ attack is where the input includes code that is then executed by the attacked system.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!