1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MAVERICK [17]
3 years ago
7

Rapid va rog!!!!!!! Am 30 minute la dispozitie!! PLSSS !!!!!

Computers and Technology
1 answer:
Stella [2.4K]3 years ago
8 0

uhhk if r dB BBL I 6th cnn he'll of

You might be interested in
The specific term for expediting the delivery of software by breaking a task into smaller increments is called
Ksivusya [100]
Rapid Application Development is the specific term
8 0
3 years ago
What should I put on a college application?⊕
gizmo_the_mogwai [7]

Answer:

Student Government. ...

Academic Teams and Clubs. ...

The Debate Team. ...

The Arts. ...

Internships. ...

Culture Clubs. ...

Volunteer Work and Community Service. ...

The Student Newspaper.

Explanation:

8 0
4 years ago
Write a complete program that declares an integer variable, reads a value from the keyboard into that variable, and writes to st
vovikov84 [41]

Answer:

#include <iostream>

using namespace std;

int main ()

{

int num;

cin>>num;

cout << num<< " " << 2 num << " " << numnum;

return 0;

}

Explanation:

See answer

5 0
3 years ago
In the context of intentional security threats, _____ can erase data and wreak havoc on computers and networks but do not replic
mihalych1998 [28]

Answer:

The answer is "Option D".

Explanation:

Trojan program is a malicious code that is also known as a virus. It is a rootkit, that aims to infect the computer to hide or obscure an object. These programs are mainly used to download additional content, such as additional pieces of malware, to the infected computer, and other options are wrong that can be defined as follows:

  • In option A, It is not correct, this option infects the system.
  • In option B, It is used for infects another computer that's why it is incorrect.
  • In option C, It is incorrect because it is used in cybersecurity.  
5 0
3 years ago
Assuming that the .data segment begins at location 0400000h, what would be memory layout for the below declarations be? Specify
Nezavi [6.7K]

Answer:

the memory layout will be like this

Explanation:

Let's say we have a system that needs to be used to develop the layout.

This may be interpreted as follows:

int may be drawn as  = int

the pointer may be represented as a jagged wavy line

Then the space can be presented as a box

4 0
3 years ago
Other questions:
  • MATLAB graphics user interface:<br> Describe what Folder, Command Window and Workspace are.
    5·1 answer
  • What has prompted schools to add Internet activities in their academic integrity policies?
    6·2 answers
  • In C, developers may access arrays via bracketed syntax like Java or by using * dereferencing notation. The following assignment
    5·1 answer
  • (true/false) In a layered operating system design, requests (such user processes may need to interact with multiple layers, resu
    14·1 answer
  • Change the shape fill color to Dark Red. It is the first option in the Standard Colors section of the color palette.
    13·1 answer
  • Can someone help me with my homework?
    7·1 answer
  • When workers use techology to work from home or an office center, they are
    7·2 answers
  • What do you think about the future of Moore’s Law? Will it continue to hold true? Will other technologies help us keep on track?
    14·1 answer
  • Complete the statement by entering the appropriate term in the space below.
    13·2 answers
  • A eclipse occurs at a full moon when the moon passes between earth and the sun
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!