1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksanka [162]
3 years ago
6

So im new how exactly does this point system work???​

Computers and Technology
1 answer:
lapo4ka [179]3 years ago
5 0

Answer:

Ok so basicly every time you see a question and you can answer it you press on the answer bar you type in your answers then you will automaticly get points depending on the question you answer, you need to get more than 5+ to ask a question  of your own

Explanation:

You might be interested in
Which statement is true about encoding in Python?
vovangra [49]

Answer:

In Python 3, strings are automatically encoded using Unicode.

Explanation:

i just tookthe test

6 0
3 years ago
Which of the following statements should be avoided when developing a mission statement?
Citrus2011 [14]

Answer: The how-to statements

Explanation:

The mission statement is simply a short summary of the purpose of a company. It is the guideline on how a company will operate. The mission statement states the reason for the existence of a company, products sold or service rendered and the company's goals.

The mission statement should be brief but comprehensive, consist of simple words and describe the “who, what, and where” of the organization.

Therefore, the incorrect option based on the explanation above is "The how-to statements". This shouldn't be part of the mission statement.

3 0
3 years ago
What name is given to any changes to the original data such as users manually modifying data, programs processing and changing d
nadezda [96]

Modification is the name given to an attack that makes changes into original data such as users manually modifying data, programs processing and changing data, and equipment failures.

In modification attacks, only changes are made to original data without deleting it completely. Modification is basically a type of attack in the context of information security. This type of attack creates annoying situations and discords by altering existing data in data files, inserting new false information in the network and reconfiguring network topologies and system hardware.

Modification attack is mainly mounted against sensitive and historical data. Modification attacks target integrity of the original data with an intent of fabricating it.

You can learn more about ha-cker attack at

brainly.com/question/14366812

#SPJ4

3 0
1 year ago
C++
vichka [17]

Answer:

#include <iostream>

#include <map>  

using namespace std;

int main()

{

   map<int, int> numbers;

   cout << "Enter numbers, 0 to finish" << endl;

   int number;

   while (true) {

       cin >> number;

       if (number == 0) break;

       numbers[number]++;

   }

   for (pair<int, int> element : numbers) {

       std::cout << element.first << ": occurs " << element.second << " times" << std::endl;

   }

}

Explanation:

One trick used here is not to keep track of the numbers themselves (since that is not a requirement), but start counting their occurrances right away. An STL map< > is a more suitable construct than a vector< >.

4 0
3 years ago
Which line of code will only allow a symbol to be stored in a variable?
nataly862011 [7]
<h2>Answer:</h2><h2></h2><h2>phone = int(input("What is your phone number?"))</h2><h2></h2><h2>Hope this helps, have a great day, stay safe, and positive!!</h2>

8 0
2 years ago
Read 2 more answers
Other questions:
  • On a hard disk each track is divided into invisible wedge-shaped sections called _______
    15·1 answer
  • A work-study student receives a paycheck from:
    15·2 answers
  • __________________ ensures that each row is uniquely identified by the primary key, which means that a proper search for an exis
    10·1 answer
  • If you want to conserve ink or toner, you can instruct powerpoint to print ____ documents.
    6·1 answer
  • What is the different between ethical and legal issues?​
    6·1 answer
  • How do the principles behind the Agile Manifesto suggest approaching architecture?A. Architecture emergesB. Architecture is not
    10·1 answer
  • Information is best described as
    10·1 answer
  • Hy plzz help me friends​
    5·2 answers
  • Caps lock key is used to type alphabets. _________​
    6·2 answers
  • Describe psychographic differences among the past five generations of Americans that you learned about in this course. What type
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!