1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vlad1618 [11]
3 years ago
7

I have no idea what I’m doing and this is due in 45 minutes

Computers and Technology
1 answer:
RoseWind [281]3 years ago
6 0

Answer:

Not enough info...

Explanation:

You might be interested in
If Number = 7, what will be displayed after code corresponding to the following pseudocode is run? (In the answer options, new l
kherson [118]

Answer:

5,10; 6,12; 7,14

Explanation:

We will demonstrate the iteration of the loop:

First iteration: Number = 7, Count = 5 at the beginning. We will check if Count <= Number? Since it is correct, prints 5,10. Increment the Count by 1.

Second iteration: Number = 7, Count = 6. We will check if Count <= Number? Since it is correct, prints 6,12. Increment the Count by 1.

Third iteration: Number = 7, Count = 7. We will check if Count <= Number? Since it is correct, prints 7,14. Increment the Count by 1.

Forth iteration: Number = 7, Count = 8. We will check if Count <= Number? Since it is not correct, the loop stops.

8 0
3 years ago
When a number gets assigned to a variable that already has a value __________. the new number overwrites the previous value at t
sammy [17]

Answer: the new number overwrites the previous value at that memory location

Explanation:

8 0
3 years ago
Which studio produced the film the jazz singer the first of many talkies
sasho [114]
What is a talkie ? please tell me
7 0
3 years ago
Do u have to divide or multiply this problem 5300 yd = mi
Alona [7]

Answer:

the answers is 3.011364 and if you need to roundnit would be 3.01

6 0
3 years ago
U.S. cybersecurity experts and government officials are increasingly concerned about breaches from __________ into corporate net
Triss [41]

Answer:

Organized crime syndicates based in the United State

Explanation:

U.S. cybersecurity experts and government officials are increasingly concerned about breaches from organized crime syndicate based in the United States into corporate networks, either through mobile devices or by other means.

The crime syndicate can go to any length to access corporate network through mobile device or any other means in order to commit crimes that is why the US cyber security expert and government officials are increasingly concerned.

Cyber security specialists or expert in the US are been employed to protect information or data that the crime syndicate may want to gain access to by using different variety of techniques by critically monitoring the systems network for attempted breaches by the crime syndicates and then dealing with any of them that is found guilty.

5 0
3 years ago
Other questions:
  • 1.
    7·1 answer
  • Ruth knows the name of a presentation file and the folder it's in, but there are many files in that folder. How can Ruth quickly
    8·1 answer
  • 10. How does a command work in conjunction with a switch?
    14·1 answer
  • All of the following are aspects of the search process except?
    5·2 answers
  • Pls help!!!!!!!!!!!!
    13·2 answers
  • Which statement is true?
    12·2 answers
  • Briefly explain why corporations are increasingly interested in using Unix or Linux for their operating systems.
    5·1 answer
  • List how much hard disk capacity you recommend, and write a sentence explaining why.
    8·1 answer
  • Which of the following variables are string types?
    10·1 answer
  • What is the easiest way to migrate data from quickbooks desktop to quickbooks online?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!