1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Goshia [24]
3 years ago
6

First to put f in the comments for will get brainliest no cap

Computers and Technology
2 answers:
PSYCHO15rus [73]3 years ago
7 0

Answer:

F

Explanation:

F

The problem is If Im the only one who answers, I cant be marked brainliest

erik [133]3 years ago
5 0

Answer:

F

Explanation: Can I get brainliest pls I am big brain

You might be interested in
What is a protocol in digital technology plwwes help
anzhelika [568]

Protocol, in computer science, a set of rules or procedures for transmitting data between electronic devices, such as computers. In order for computers to exchange information, there must be a preexisting agreement as to how the information will be structured and how each side will send and receive it.

3 0
3 years ago
Information systems (is) users have no responsibility to follow security and backup procedures. group of answer choices true fal
Sauron [17]

The statement 'information systems (IS) users have no responsibility to follow security and backup procedures' is false.

Any kind of data that is available on the Internet has to be protected. All information users have the responsibility to follow the security procedures so that an unwanted circumstance does not arise. Hence, the statement above is false.

It is the responsibility of an organization to protect its data. For this reason, everyone, including the information systems (IS) users is entitled to follow security and backup procedures.

One should recognize that all these security and backup procedures are for our own security as data misplaced can be a loss to the whole organization. Security and backup procedures also help to keep data safe from hackers.

To learn more about information systems, click here:

brainly.com/question/25226643

#SPJ4

3 0
2 years ago
Write a program using integers userNum and divNum as input, and output userNum divided by divNum three times.
riadik2000 [5.3K]

Answer:

Follows are the code to this question:

#include <iostream>//header file

using namespace std;

int main() //defining main method

{

int userNum, divNum;//defining integer variable

cin>> userNum >> divNum;//input values

cout <<"First-time divide: "<<userNum / divNum<<endl;//divide value First time  

cout <<"Second-time divide: " << userNum / divNum/divNum<<endl; //divide value Second time

cout<<"Third-time divide: "<< userNum /divNum/divNum/divNum<<endl;//divide value Third time

return 0;

}

Output:

2000

2

First-time divide: 1000

Second-time divide: 500

Third-time divide: 250

Explanation:

In this code two integer variable "userNum and divNum" is declared that uses the input method to input value from the user-end, and after input the value it divides the "userNum by divNum" three times, that is defined as follows:

In this code, the user input the value 2000 and 2, in the first divides it will give 1000, in the second time divide it will give 500, and in the third time it will give 250.

7 0
3 years ago
Clicking a _____ name opens a drop-down list of commands and options. Select one: a. menu b. status bar c. ribbon d. toolbar
Rasek [7]

Answer:

menu

Explanation:

https://quizlet.com/231958668/windows-chapter-1-concepts-exam-flash-cards/

6 0
3 years ago
List the basic computer hard drive components, name and link to them human; also explain task
White raven [17]

Answer:

Explanation:

Quite simply, computer hardware is the physical components that a computer system requires to function. It encompasses everything with a circuit board that operates within a PC or laptop; including the motherboard, graphics card, CPU (Central Processing Unit), ventilation fans, webcam, power supply, and so on.

3 0
3 years ago
Other questions:
  • Trevor got home from work and suddenly realized that he needed to edit a certain file stored in the company network's server. ho
    11·1 answer
  • ____ are diagrams used in mathematics and logic to help describe the truth of an entire expression based on the truth of its par
    8·1 answer
  • As a computer starts up, you see an error message about a missing operating system. At what point in startup does this error occ
    14·1 answer
  • "omr, ocr, and micr are all types of ________."
    7·2 answers
  • Which of the following statements isNOT true about abstract data types (ADTs)?A list is anexample of an ADT.ADTs hide theimpleme
    7·1 answer
  • What does the Finder do?
    7·1 answer
  • The seven basic parts of a computer are
    10·2 answers
  • Enhancement of job satisfaction and productivity are key characteristics of which theoretical perspective of work design? ​
    6·1 answer
  • Wanna play pubg<br><br><br>ill send u my id​
    5·2 answers
  • 6
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!