1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kap26 [50]
3 years ago
12

What help the ict in your life?and write own idea three or four sentence

Computers and Technology
1 answer:
My name is Ann [436]3 years ago
7 0

Answer:

I am a software engineering student

computers have createed an impact in my life because through computers i work, I do research and many more

You might be interested in
How many different bit strings are there of length 8 that contain the string 0000?
Nataly_w [17]

Answer:

answer is 8! / (4! * 4!). Which gives a value of 70.

Explanation:

we have 8 places, we’re going to pick 4 places to put the zeros, it is 8! / (4! x 4!)

3 0
2 years ago
.An algorithm specifies the actions to be executed.<br><br> True<br><br> False
steposvetlana [31]

Answer:

True.

Explanation:

An algorithm for a problem provides the set of instructions that are required to solve a problem.It does not provide the full code.It is like an abstract solution of a problem.It is just like a recipe for cooking a dish.It will not cook food for you but can tell you how to cook.

Since it provides the action to be executed hence the answer is True.

3 0
3 years ago
What laws are broken when you hack someone?
postnew [5]

Answer:

it depends

Explanation:

if you are hacking for a purpose that is benefiting the person being hacked, that is ethical hacking. ethical hacking is not illegal, as long as you get permission from the person being hacked.

if you hack someone without their knowledge, that is unethical hacking, and that is in many cases, a crime, and if it has enough of a detrimental effect on a companys process, it could land you into prison and earn you a hefty fine.

ethical hacking is good for testing a networks security, and if all is well, the ethical hacker shouldnt be able to get into a network if it is secured properly.

6 0
3 years ago
Write a pseudocode method swap(aList, i, j) that interchanges the items currently in positions i and j of a list. Define the met
serious [3.7K]

Answer:

Explanation:

The following pseudocode for this method using operations of the ADT list would be the following

swap(aList, indexI, indexJ) {

    initialize temp_variable = Retrieve(indexI, aList)

    Insert(Retrieve(indexJ, aList), indexI, aList)

    Insert(Retrieve(indexI, aList), temp_variable, aList)

}

This code basically saves the aList index of i , into a temporary Variable. Then it sets the aList index of i to the value of the element in index of j. Then it does the same for the index of j with the tem_variable. If we assume that the indexes of i and j exist, then it can crash our entire program if those indexes are missing from the list when we try to access them.

6 0
3 years ago
In project management, which step involves the project manager identifying
nasty-shy [4]

Answer: The only help is your lord and savior Jesus Christ Amen YAR

Explanation: The Bible or Church

8 0
2 years ago
Other questions:
  • Which of the following is NOT an option in the comments group
    12·1 answer
  • a reviewer is required to enter a reason in the comments field only when a candidate is recommended to be hired. which action ca
    8·1 answer
  • Which business filing process puts documents or data in the order by date? a. Linear
    7·1 answer
  • Describe the following software process models using your own words .Your explanation should also provide an example of a softwa
    12·1 answer
  • WHICH OF THE FOLLOWING LOOKS JUST LIKE A CD ROM BUT CAN STORE MUCH MORE INFORMATION
    8·2 answers
  • If a hypothesis is strongly supported by the scientific community based on compelling experiment results, it becomes a————
    10·2 answers
  • Can you guys help me plz <br> I want c++ code
    12·1 answer
  • What is the base of a number system?
    8·1 answer
  • How is binary used in pixels and in sound?
    5·2 answers
  • Because Brainly is such a big organization for students in need of help with their school work, I believe that it was either som
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!