1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Genrish500 [490]
3 years ago
8

How old am i (Will give brainliest)

Computers and Technology
1 answer:
diamong [38]3 years ago
4 0
You’re probably thirteen
You might be interested in
Which of the following shows how to correctly declare pointer variable x?
QveST [7]

Answer:

declaration of pointer variables are done using *

Explanation:

* denotes the declared variable is a pointer which can hold address of another location. To get values of any address & is used. For example, we have an integer variable <em>a</em> to which holds a value 10. if you want to read the address of the variable <em>a</em>, use <em>&a</em>. To store this address in any other memory declare a pointer variable.

int a = 10;

int *loc_a;

loc_a = &a;

7 0
3 years ago
What types of standards are developed by the Electronics Industries Alliance (EIA)?
vladimir1956 [14]

Answer:

It comprises individual organisation that together have agreed on certain data transmissions standards such as EIA/TIA -232 formerly known as RS- 232

5 0
3 years ago
Read 2 more answers
NWhen you measure a person’s weight, you are measuring the
MAVERICK [17]

Answer:

gravitational force acting on that person.

Explanation:

5 0
3 years ago
Read 2 more answers
What type of attack is dependent on sending packets too large for the server to handle?
Art [367]
I think the answer is a kernel attack. Kernel attacks often send corrupted packets, but they also send large packets, allowing the server to crash and make an opening.
7 0
3 years ago
20.
Kazeer [188]

Answer:

Megabyte

Explanation:

Megabytes come before Gigabytes like how Gigabytes come before Terrabytes

8 0
3 years ago
Other questions:
  • You try to enter your name into a cell that accepts a numeric value. What error would you receive
    12·2 answers
  • Whats the 7 internal components found in a computer tower
    11·1 answer
  • 7. Write a program in C to display the string "ARRAY" in the following format : A AR ARR ARRA ARRAY
    5·1 answer
  • Click _______ to view each individual record of a mail merge document.
    5·2 answers
  • Elaine had a problem with the computer printer she purchased. When she called the toll-free service number, she was told that sh
    7·1 answer
  • Write down the pseudo code of a program that calculates the Body Mass Index (BMI) of
    9·1 answer
  • Baris script yang digunakan mendefinisikan website yang akan diblokir proxy server adalah
    5·1 answer
  • You want a class to have access to members ofanother class in the same package. Which is themost restrictive access that accompl
    11·1 answer
  • Identify the following as True or False: (1) Naive Bayes is a linear classifier. (2) SVMs are only usable when the classes are l
    8·1 answer
  • Write an application program in C++ to implement a class Fibonacci to print Fibonacci series upto N using member function series
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!