1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saul85 [17]
3 years ago
6

WILL MARK BRAINLIEST Question #2

Computers and Technology
1 answer:
KiRa [710]3 years ago
5 0

Answer:

correct[3]

Explanation:

Required

Which expression points to the u in "cloud"

First, it should be noted that "cloud" is a string and as such, the first element is represented as index 0, the next as index 1, etc.

Using the above as a guide, the u is as index 3

To access the elements of a string, we use: stringname[index]

In this case, the string name is correct.

<em>Hence, the correct statement is: correct[3]</em>

You might be interested in
Which of these is an example of subliminal advertising
solniwko [45]

Answer:

D. a claim that more people drink a certain brand of cola that others

Explanation:

Basta yan yung sagot ko

7 0
3 years ago
Read 2 more answers
•
Natali [406]

Answer:

ion k srry

Explanation:

3 0
3 years ago
In the context of computer crimes, those who attempt to destroy the infrastructure components of governments and financial insti
elixir [45]

In the context of computer crimes, those who attempt to destroy the infrastructure components of governments and financial institutions are known as <u>d. cyber terrorists</u>.

<u>Explanation</u>:

Cyber crime means crime committed with the help of computer and internet. Cyber terrorism means crime that causes damage to infrastructure components of financial institutions and government office and causes threat to the society.

Cyber terrorists are person who involve in cyber terrorism. The systems used in the governments and financial institutions should be protected with hardware and software to avoid cyber terrorism.

This kind of cyber terrorism is very dangerous, as they hack the system and destroy the valuable information stored in it.

5 0
3 years ago
Which payment type is best if you are trying to stick to a budget?
gavmur [86]
Debit is the best payment type
3 0
3 years ago
What should the shutter speed be on the camera?<br> A. 1/30<br> B. 1/50<br> C. 1/60<br> D. 1/15
11Alexandr11 [23.1K]

Answer:

C. 1/60

Explanation:

Shutter speed is most commonly measured in fractions of a second, like 1/20 seconds or 1/10 seconds. Some high-end cameras offer shutter speeds as fast as 1/80 seconds. But, shutter speeds can extend to much longer times, generally up to 30 seconds on most cameras.

But in this case C. 1/60 is the answer.

6 0
3 years ago
Other questions:
  • Which is a common problem caused by the widespread use of computers?
    7·1 answer
  • What does “int” means in php code
    13·1 answer
  • Which cell has no nucleus ?​
    7·2 answers
  • Which hypervisor works on older pcs without hardware virtualization support?
    9·2 answers
  • Name three types of data stored on a computer’s hard disk
    11·1 answer
  • If a clean install is performed on a hard drive with a previous install of windows and the drive is not re-formatted during the
    9·1 answer
  • Which of the following internet protocols is used to request and send pages and files on the World Wide Web
    13·1 answer
  • State True or False: 1. Application software can run without the presence of system software. 2. . A language processor translat
    14·1 answer
  • Computer is a major source of informarion why​
    8·1 answer
  • When we look for errors inside of our code on our own or with a partner , what is that called?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!