1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saul85 [17]
3 years ago
11

Para ti que es el sexting​

Computers and Technology
1 answer:
Alexus [3.1K]3 years ago
7 0

Answer:

what?

Explanation:

You might be interested in
Excel files have a default extension of ?
podryga [215]
I think .ppt

If I’m wrong I’m sorry

Ik lil bit but this is my max for now
4 0
3 years ago
Explain why interrupt times and dispatch delays must be limited to a hard real-time system?
BigorU [14]

Answer:

The important problem is explained in the next section of clarification.

Explanation:

The longer it is required for a computing device interrupt to have been performed when it is created, is determined as Interrupt latency.

The accompanying duties include interrupt transmission delay or latency are provided below:

  • Store the instructions now being executed.
  • Detect the kind of interruption.
  • Just save the present process status as well as activate an appropriate keep interrupting qualitative functions.
7 0
3 years ago
What kind of video are you are able to watch by downloading it from the Internet?
Helen [10]

Answer: Digital Video

Explanation: So basically, online content videos on the internet are in the form of encoded digital data displayed in rapid succession. Such kind of data therefore can be streamed in a digital video.

4 0
3 years ago
GenXTech is a growing company that develops gaming applications for military simulations and commercial clients. As part of its
rodikova [14]

Answer:

enterprise architecture

Explanation:

Based on the information provided within the question it can be said that in this scenario GenXTech seems to be creating an enterprise architecture. This is a blueprint that completely detail the structure and different operations within an organization, with the main focus of how the organization can best achieve it's objective. Which is what GenXTech is trying to do by analyzing it's situation.

4 0
3 years ago
Python Coding:
leva [86]

Answer:

# Here we are asking the user for a number two times

userInput1 = input("Enter any #: ")

userInput2 = input("Enter any # again: ")

# We compare if userInput1 is greater than userInput2

if(userInput1 > userInput2):

   # Print userInput1 if userInput1 is greather than userInput2

   print("First Number: " + userInput1)

   # Otherwise, print userInput2

else:

   print("Second Number: " + userInput2)

# Initiate a while-loop

while(True):

   # The lines below are from above

   userInput1 = input("\nEnter any #: ")

   userInput2 = input("Enter any # again: ")    

   if(userInput1 > userInput2):

       print("First Number: " + userInput1)

   else:

       print("Second Number: " + userInput2)

   # We ask the user whether they would like to stop

   stop = input("\nWould you like to stop? (Yes or No)")

   # Compare the String stop with "Yes"

   if(stop == "Yes"):

       # If true then break

       break

Explanation:

The use of \n is unnecesary, but it skips a line and provides more readability.

5 0
2 years ago
Other questions:
  • Bullets in a text box will do which of the following?
    9·1 answer
  • _____ are considered to be the most important element in a computer-based information system.
    8·1 answer
  • A/an ___________ is a scheduling tool that sets the standard and nonworking time for the project and is used to assess how tasks
    6·1 answer
  • Write a program that determines the value of the coins in a jar and prints the total in dollars and cents. Read integer values t
    5·1 answer
  • Write a statement that compares the values of score1 and score2 and takes the following actions. When score1 exceeds score2, the
    7·1 answer
  • Applications software is also known as
    14·2 answers
  • Which is an aspect of structural-level design?
    6·2 answers
  • An IT security threat is anything that might cause serious harm to a computer system, including someone stealing a laptop that c
    8·2 answers
  • Select the software which is used to convert audio data to text .
    15·1 answer
  • Lily obtained data from five trails 50 kcal 72 kcal 12 kcal and 50 kcal which best decribes her data
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!