1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vikki [24]
3 years ago
10

How to write this program , please ?​

Computers and Technology
1 answer:
sleet_krkn [62]3 years ago
6 0

Answer:

010101010101

Explanation:

Ao código binario

You might be interested in
A team is in the process of developing a motion picture. Currently, they are creating ideas for advertisements to make people in
sweet-ann [11.9K]

Answer:

It's distribution

Explanation:

I took the test

7 0
3 years ago
You just bought a new hard drive for your computer to replace your primary hard drive. After backing your data up and, then, ins
Fofino [41]


It manages the soft and hardware resources of the system. It also provides a stable, consistent way for applications to deal with the hardware without knowing all of the details of the hardware

8 0
3 years ago
Read 2 more answers
Types of computers bazed on size cost &performance​
Anastaziya [24]

Answer:

micro ATX is cheaper but air flow will be horrible

ATX is the best all around

Explanation:

8 0
2 years ago
Read 2 more answers
In Microsoft word when you highlight existing text you want to replace , you're in?
lorasvet [3.4K]

Insert Mode

[insert 20 characters]

6 0
4 years ago
During the reconnaissance step of the attack, what open ports were discovered by Zenmap? What services were running on those por
Setler [38]

Answer:

Following are the solution to the given question:

Explanation:

It sends commands to its Nmap executable platForm, which is used to specified and retrieves the production. The  ZenMap utilizes templates, which are primarily Nmap.

The parameter templates to decide how scans become formed Several ports, like ports, are available: 11, 21, 22, 25, 53, 445, and 3306, all of which run TCP: Linux services, SMTP Postfix, Apache Tomcat/Coyote JSP.

5 0
3 years ago
Other questions:
  • Which of the following is a domestic business activity?
    6·2 answers
  • The development team recently moved a new application into production for the accounting department. After this occurred, the Ch
    7·1 answer
  • _____ was just a sophomore when he began building computers in his dorm room at the University of Texas. His firm would one day
    14·1 answer
  • Within a Microsoft Windows environment, who has access rights to the Encrypting File System (EFS) features and functions?
    7·1 answer
  • Which of these stamtemnst correctly descride how to adjust a imange on a slide
    8·1 answer
  • Write a program that reads an integer, a list of words, and a character. The integer signifies how many words are in the list. T
    6·1 answer
  • An algorithm whose worst-case time complexity is bounded above by a polynomial function of its size is called a(n)
    13·1 answer
  • What is lossless compression
    6·2 answers
  • An alternative to hexadecimal notation for representing bit patterns is dotted decimal notation in which each byte
    11·1 answer
  • How can you prevent someone with access to a mobile phone from circumventing access controls for the entire device
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!