1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elden [556K]
3 years ago
9

What do you get with brainly points

Computers and Technology
1 answer:
Charra [1.4K]3 years ago
5 0

i dont know but here I am, grinding points for some reason

You might be interested in
Who is the intended audience of a pseudocode document?
cluponka [151]

Answer and Example:

Pseudocode is an artificial and informal language that helps programmers develop algorithms.

Pseudocode is a "text-based" detail (algorithmic) design tool. The rules of Pseudocode are reasonably straightforward. All statements showing "dependency" are to be indented.

Pseudocode is understood by the programmers of all types. it enables the programmer to concentrate only on the algorithm part of the code development.

Java would use this.

3 0
3 years ago
Phishing (pronounced fishing) is malware sent through e-mail that looks like a legitimate message from a trusted sender. The goa
never [62]

Answer:

this is true

Explanation:

the answer is true

5 0
3 years ago
Read 2 more answers
What additional features on your router would you implement if you were setting up a small wired and wireless network
olganol [36]

Answer:

Explanation: The following features will be implemented:

1) Guest networks,

2) Networked attached storage,

3) MAC filtering

A guest Wi-Fi network is essentially a separate access point on your router. All of your home gadgets are connected to one point and joined as a network, and the guest network is a different point that provides access to the Internet, but not to your home network. As the name implies, it's for guests to connect to.

Network Attached Storage

is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve data from centralized disk capacity. Users on a local area network (LAN) access the shared storage via a standard Ethernet connection.

MAC address filtering allows you to define a list of devices and only allow those devices on your Wi-Fi network.

6 0
3 years ago
Read the argument below and determine the underlying principle that was used to come to the conclusion presented: It is recommen
PIT_PIT [208]

Answer:

Hence option a is the correct one. Driving a car can be dangerous, but if you learn how to properly drive a car then you can significantly reduce the risk involved,

Explanation:

a) Driving a car can be dangerous, but if you learn how to properly drive a car then you can significantly reduce the risk involved.

As it belongs How to be a good car driving without risk as equivalent diet concept as a base.

Less than 3-5 servings of vegetables a day not taken equivalent car driving dangerous if no proper driving.

Hence option 1 is valid.

b) is wrong as it has negative feedback regarding the base case.

c) is a suggestion for the strong part which is also the wrong option

5 0
3 years ago
Tại sao xe chỉ sản xuất ra 1996cc mà không phải là 2000cc?
melisa1 [442]

Answer:

hjfkkkjgfyuu7oiuygfffggg

8 0
3 years ago
Read 2 more answers
Other questions:
  • Background Susan finished work on system architecture issues, and her system design specification was approved. Now she is ready
    15·1 answer
  • Two electronics technicians are looking at the representations of a silver atom and a copper atom in the figure above. Technicia
    10·1 answer
  • What is the difference between Data and information?​
    7·1 answer
  • In this mode, your presentation will fill up the entire screen. Auto Default Standard Window
    6·2 answers
  • Can you clone apps form your PC and to other PC?<br>Yes or No
    13·2 answers
  • 1. Itemise the order in which BASIC executes arithmetic operation.
    13·1 answer
  • Write a function process_spec that takes a dictionary (cmap), a list (spec) and a Boolean variable (Button A) as arguments and r
    10·1 answer
  • Another way to create a new presentation is from the Home tab
    6·2 answers
  • I am making a project i have to advertise a product i picked a futureistic car
    10·1 answer
  • The data _____ component of a database management system (DBMS) is used to create and maintain the data dictionary.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!