1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gtnhenbr [62]
3 years ago
15

Three negative impact of littering​

Computers and Technology
1 answer:
andrew11 [14]3 years ago
8 0

Answer:

planet destroyed

loss of animals

resources wasted

Explanation:

You might be interested in
A communication medium that carries a large amount of data at a fast speed is called
AveGali [126]
A communication medium that carries a large amount of data at a fast speed is called broadband. Broadband can transmit multiple signals at the same time. The term gained popularity during the 1990s for the marketing of internet. The term is used in radio, television and internet terminology. Though there is slight difference in the definition in each category, the term primarily stands for the ability of a medium to send and receive a lot of data at a fast speed.
4 0
3 years ago
How would you describe the relationship between blocks of code and commands?<br>HELP​
Karolina [17]

Answer:

Code and Commands have similar programs coding has only one thing to do or done but commands can be told anytime by an input device.

Explanation:

hope this helps.

7 0
3 years ago
In Java; Given numRows and numColumns, print a list of all seats in a theater. Rows are numbered, columns lettered, as in 1A or
Free_Kalibri [48]

Answer:

import java.util.Scanner;

public class NestedLoops

{

public static void main(String[] args) {

 Scanner scnr = new Scanner(System.in);

       int numRows;

       int numColumns;

       int currentRow;

       int currentColumn;

       char currentColumnLetter;

       

       System.out.print("Enter number of rows: ");

       numRows = scnr.nextInt();

       System.out.print("Enter number of columns: ");

       numColumns = scnr.nextInt();

       

       for(int i = 1; i <= numRows; i++){

           currentColumn = 1;

           currentColumnLetter = 'A';

           for(int j = 1; j <= numColumns; j++){

               System.out.print("" + i + currentColumnLetter + " ");

               currentColumn++;

               currentColumnLetter++;

           }

       }

}

}

Explanation:

Ask user to enter the number of <em>rows</em> and <em>columns</em>.

Create a nested for loop, outer loop goes until <em>numRows</em> and inner loop goes until <em>numRows</em>.

Inside the first loop, set <em>currentColumn</em> to 1 and <em>currentColumnLetter</em> to 'A'. This way for after each row column value starts from 1 and letter value starts from A.

Insite the second loop, print the row value - <em>i</em>, and <em>currentColumnLetter</em>. Also,increment <em>currentColumn</em> and <em>currentColumnLetter</em> values by 1.

4 0
3 years ago
What makes up data encryption standard ?
galben [10]

Answer:

Data Encryption Standard Use Cases. The DES was a data security standard used to encrypt and decrypt non-classified computer data generated by the United States government and any commercial organization. The Data Encryption Standard (DES) is a symmetric-key block cipher published by the National Institute of Standards and Technology (NIST). ... Note that both the right section and the key are 48-bits in length. Also note that the round key is used only in this operation. The DES is a product block cipher in which 16 iterations, or rounds, of substitution and transposition (permutation) process are cascaded.

Explanation:

If this helps can i have brainliest

8 0
3 years ago
A web application with an SQL server database is found to be compromised by an attacker. On examination, the email IDs of the da
Thepotemich [5.8K]

Answer:

This is what we call SQL Injection.

• SQL Injection is when an attacker compromises your database only if it is vulnerable.

• Vulnerability includes leaving an empty ""(value) or forgetting to close anything that could be attacked.

• Ways to prevent injection is to not use string concatenation.

(<em>ex.</em> "hello" + "world")

*  Use parameterized queries.

*   Immediately get rid of any unused code.

5 0
2 years ago
Other questions:
  • When you see a blank pointer this means you can drag the row or column border to change height or width
    14·1 answer
  • What can be used to describe and document the analysis and design of complex software systems?
    14·1 answer
  • The encapsulation unit on the data link layer of the osi model is _________
    10·1 answer
  • Indicate if the following statements are True or False. Statement Circle one Internet Service Providers (ISPs) are proprietary n
    13·1 answer
  • What must you do when you save a file for the first time
    7·2 answers
  • Classify the following skills: preparing a presentation, rebuilding a car, and solving equations.
    11·2 answers
  • Which devices are managed through device management? Device management is the process of managing----(blank)-----devices.
    15·1 answer
  • Serting a header at the top of a page will make it appear on_____. ?
    13·1 answer
  • Cách soạn thảo văn bản trên word
    7·1 answer
  • How to type an absolute reference formula in exel
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!