1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
klemol [59]
3 years ago
15

Chose the term that matches each definition.

Computers and Technology
1 answer:
mixas84 [53]3 years ago
3 0

Answer:

Moore's Law: predicts technology power and capacity will double every two years

Computer mouse: a device invented by Douglas Engekbart to work with graphical operating systems

Explanation:

You might be interested in
1.The character escape sequence to force the cursor to go to the next line is________: 2. The character escape sequence to force
Luda [366]

Answer:

Hi there Kaylee! The answers to the blanks are as follow:

1.The character escape sequence to force the cursor to go to the next line is \n

2. The character escape sequence to force the cursor to advance forward to the next tab setting is \t  

3.The character escape sequence to represent a single quote \'

4.The character escape sequence to represent a double quote is \"

5.The character escape sequence to represent a backslash is \\

Explanation:

Character escape sequences are used for processing of special characters that may otherwise be used in a context where those characters are reserved as keywords or carry other symbolic reference. If these are not escaped, the output will not be correct.  

6 0
3 years ago
Programming CRe-type the code and fix any errors. The code should convert non-positive numbers to 1.
LUCKY_DIMON [66]

Answer:

Given

The above lines of code

Required

Rearrange.

The code is re-arrange d as follows;.

#include<iostream>

int main()

{

int userNum;

scanf("%d", &userNum);

if (userNum > 0)

{

printf("Positive.\n");

}

else

{

printf("Non-positive, converting to 1.\n");

userNum = 1;

printf("Final: %d\n", userNum);

}

return 0;

}

When rearranging lines of codes. one has to be mindful of the programming language, the syntax of the language and control structures in the code;

One should take note of the variable declarations and usage

See attachment for .cpp file

Download cpp
5 0
4 years ago
What would the internet be like today if there was no World Wide Web?
Anvisha [2.4K]

Answer:

Non existent probably

Explanation:

3 0
3 years ago
You are implementing a new application control solution. Prior to enforcing your application whitelist, you want to monitor user
shepuryov [24]

Answer: Flag

Explanation:

When using an application control solution, it should be noted that the application whitelist is typically centrally defined which is applied to the network devices. In such case, the applications that are contained in the whitelist will be the only one that are allowed.

Therefore, the applications that are not contained in the whitelist should be flagged. This is necessary in order to effectively monitor the user traffic for a period of time in order to discover user behaviors.

5 0
3 years ago
Please I need help to create an IPO chart for this program “Input a list of positive numbers, terminated by 0, into an array num
Eduardwww [97]

<u>Input :</u>

*Processing*

<u> Output :</u>

An array full of numbers which is terminated by 0.

<u> Algorithm: </u>

1. **Start

2. **Take an array, max, and min as variables.

3. **Get the numbers from the user.

4. **Initialize the max and min variables as a[0].

5. **Now, check if max>a[i]. If true, reinitialize max=a[i].

6. **Check if min<a[i]. If true, reinitialize min=a[i].

7. **Print max and min.

8. **Stop

7 0
3 years ago
Other questions:
  • 1. Perform the following Binary Additions 101101 + 10100 *
    13·2 answers
  • Podcast ____ software uses rss to allow you to subscribe to your favorite podcasts from one central application.
    12·2 answers
  • Motorcyclist might make an adjustment in speed when encountering ?
    7·2 answers
  • What is predictive dialing?
    12·1 answer
  • 8. _______ are used to store all the data in a database.
    7·2 answers
  • _______ view is used to size field names and controls and to apply formats.
    10·2 answers
  • When both inputs of a J-K edge-triggered FF are high and the clock cycles, the output will ________.
    11·1 answer
  • The purpose of a flowchart is similar to the purpose of pseudocode.<br> True<br> False
    5·2 answers
  • When solving a problem in a group situation, which of the following traits should be demonstrated?
    8·1 answer
  • What is real time os ?​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!