1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anastasy [175]
3 years ago
11

WHO HAS TWITCH PLS FOLLOW ME MY TWITCH IS giaplayzgamez I'm uploading Videos Soon.

Computers and Technology
2 answers:
Mumz [18]3 years ago
8 0

Answer:

Cool

Explanation:

Paraphin [41]3 years ago
6 0
Coolio said he had a little bit of a
You might be interested in
For a data structure, such as a stack, who is responsible for throwing an exception if the stack is empty and a pop() is called:
lubasha [3.4K]

Answer:

D. End-User Programmer.

Explanation:

A stack data structure is used to holds data for programs. The first data to go into a stack is always the last to be extracted (First-in-Last-out). Data is read into the stack with the push function and retrieved with the pop function.

When the stack is empty, it means there are no data left to pop from it. If a pop function is issued at this time, the program conventionally throws an error, there is no need for the end-user to write an exception handler for it because the end-user programmer has done that already.

4 0
3 years ago
Why might a business use spreadsheet software for bookkeeping?
Ugo [173]

Answer:

organize and categorize

Explanation:

Spreadsheets are an essential business and accounting tool. They can vary in complexity and can be used for various reasons, but their primary purpose is to organize and categorize data into a logical format. Once this data is entered into the spreadsheet, you can use it to help organize and grow your business.

8 0
3 years ago
Machine-to-machine (M2M) technology enables sensor-embedded products to share reliable real-time data ________.Select one:a. ove
just olya [345]

Answer:b)via radio signals

Explanation: Machine-to-machine technology is the technology that helps in sharing of the real time information of the device that have embedded sensor.They can work without the help of the manual factors.

The data is shared through the help of the radio signals in the devices like turbines vending machines etc for the tracking purpose and managing.

Thus the other options are incorrect because short distance is a disttance, cloud services are for the collection of services and databases contains the data. So, the correct option is option (b).

5 0
4 years ago
A(n) ____ instruction might look like a meaningless string of 0s and 1s, but it actually represents specific operations and stor
Makovka662 [10]

Answer:

Option d is the correct answer.

Explanation:

Machine language is a language that is understood by any machine because it is made from the electric signal which has only two states on and off. On state refers to 1 and off-state refers to 1. The computer is also a type of machine so it can also understand machine language. The above question asked about the instruction which is made by 0's and 1's and it is used for the computers then the answer is Machine language which is described above and which is stated from the option d. Hence option d is the correct answer while the other is not because--

  • Option 'a' states about COBOL language which is an example of high-level-language, not the example of machine language.
  • Option b states about the programming language which is a mixture of all language of computers.
  • Option c states about ASCII which is not the correct answer.

7 0
4 years ago
Changing the configuration of a database falls under which category of databaseâ administration?
harkovskaia [24]
Changing the configuration of a database falls under which category of databaseâ administration?

d. operation
8 0
3 years ago
Other questions:
  • Use the image above to determine which toolbars will be displayed in the program you are using. SELECT ALL THAT APPLY
    11·2 answers
  • Question # 4
    11·1 answer
  • Liam is a hacker who tries to access Wi-Fi signals while driving his car. What type of wireless network attack is this?
    9·1 answer
  • Create an application named TurningDemo that creates instances of four classes: Page, Corner, Pancake, and Leaf. Create an inter
    7·1 answer
  • What is the way to discover requirments for software projects ?
    14·1 answer
  • 5) The City Jail Technologies Department is constructing an application to allow users in the Crime Analysis Unit to query data
    11·1 answer
  • Which system is understood by the computer system​
    7·1 answer
  • During an election year, why would a senator want to determine a mode?
    11·1 answer
  • As we’ve discussed, computer programs are considered creative works and are protected by copyright. That means those programs be
    12·1 answer
  • Web résumés allow you to include extra graphics and images that you would not include in a traditional résumé. please select the
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!