1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hoochie [10]
3 years ago
9

In QBasic, create a number guessing challenge. Your program should generate a random number from 1-

Computers and Technology
1 answer:
Sergio039 [100]3 years ago
6 0

Answer:

yes

Explanation:

You might be interested in
¿Qué tipo de contenido es un archivo con extensión mp3?
DaniilM [7]

Answer:

Sonido

Explanation:

3 0
3 years ago
Which below best describes JavaScript? *
marysya [2.9K]

Answer:

it is a programing languwage that is useualy used to program visual or text based applications

Explanation:

6 0
3 years ago
Read 2 more answers
What kind of cable would you use to connect a network printer to the soho router if you were using a wired connection to the net
Ksivusya [100]

Answer:

A) Ethernet

To Connect the Printer to a Wired (Ethernet) Network

<h3>what is the process of connecting a network printer to the SOHO router?</h3>
  • Connect one end of an Ethernet cable to the Ethernet port on the back of the printer, then connect the other end of the cable to a correctly configured network port, switch or router port.
  • Connect the Printer to a Router.

To learn more about ethernet, refer

to brainly.com/question/24621985

#SPJ4

4 0
2 years ago
Define types of hacker ? with three to four line of each types?​
Strike441 [17]
1.) benevolent hackers are hackers that use their skills to assist people in getting back stolen information, and usually put bad people in their place
2.) malevolent hackers use their skills to cause harm to others by either stealing information or leaking it, hacking into social media accounts or by infiltrating computers and implanting malware of some kind, but this isn’t normally done by hacking, you can do it just by sending an email with a sneaky link or virus in it.
Those are the two main types but there are also hackers who work for the government as cyber security protection or even to hack into targets of the government.
5 0
3 years ago
What is pollen grain​
SCORPION-xisa [38]
Pollen grains are microscopic structures that carry the male reproductive cell of plants
5 0
3 years ago
Other questions:
  • helppppp asap!!!!!!!!!! Sara has just started using the Internet. She would like to be a little more efficient. In 3–4 sentences
    9·2 answers
  • Jamie is not sure a new medication will work because it has not had a large test group. Is Jamie being creative?
    9·2 answers
  • Why was the personal computer an important invention?
    7·1 answer
  • But this time use 16 kib pages instead of 4 kib pages. what would be some of the advantages of having a larger page size? what a
    11·1 answer
  • The _____ search algorithm searches a list for a given item, starting with the first element and continues to compare the item w
    12·1 answer
  • Black box testing is the practice of writing tests without knowing the implementation of the code you're testing. White box test
    9·1 answer
  • Traditionally, remote administrative access on routers was configured using Telnet on TCP port 23. However, Telnet was developed
    8·1 answer
  • The signature area in a cover letter includes the sender's first and last name, followed by his/her job title (if applicable). *
    13·1 answer
  • Honey Pots:__________
    7·1 answer
  • What are the differences between Cc &amp; Bcc in emails that are sent ?​
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!