1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
solmaris [256]
3 years ago
12

Challenge activity 1.11.1: using constant in expression is not working for me. Can any one help me find the right code?

Computers and Technology
1 answer:
cestrela7 [59]3 years ago
8 0

Answer:

could you please tell me which grde are you in?

You might be interested in
What operating system was most commonly used by early personal computers? Apple Mac MS-DOS Windows
marshall27 [118]
Windows, its oldest
8 0
3 years ago
Read 2 more answers
• > Four 240-pin DDR3 SDRAM DIMM sockets arranged in two channels • > Support for DDR3 1600+ MHz, DDR3 1333 MHz, and DDR3
bezimeni [28]

Answer:

The memory used in this system does not perform checking error.

Explanation:

Non ECC memory is referred to  the non error checking. In this configuration the computer is able to perform assigned tasks quickly but is unable to perform checking errors. The memory supports 16GB system and the 1333 MHz is the speed of the memory.

7 0
3 years ago
In the world of computing,accessibility MOST often refers to what
Nutka1998 [239]

<span>Accessibility refers to access to some form of computer technology. This means that numbers are easily organized and data is easily calculated making it easier for people’s lives. It is a means of an efficient and more productive existence in the work environment.</span>

5 0
3 years ago
What type of maintenance can prevent the computer from breaking?
qwelly [4]
<span>The answer is, "Load anti-virus software".
</span>Anti-virus softwares are used to prevent computer from virus, as it name shows that are anti-virus means they prevent from virus. Anti virus softwares are also known as anti-malware software. These software work in such a way that they <span>prevent, detect and then remove viruses or </span><span>malicious software.</span>
3 0
3 years ago
Read 2 more answers
Multibeam sonar technology uses _____.
blsea [12.9K]
More than one sound source and listening device<span>
</span>
8 0
3 years ago
Read 2 more answers
Other questions:
  • E-fit and similar software compares what?
    7·1 answer
  • Which technology forms the foundation for cloud computing? forms the foundation for cloud computing.
    12·2 answers
  • Which one of the following statements is correct? a. Web browsers cannot function without cookies. b. Cookies are text files and
    9·1 answer
  • 1. Some of the music in the 1960s was used to protest social and political issues. Is music still used as a form of protest? Why
    13·1 answer
  • Password is an example of an authentication mechanisms that is based on " what an entity has".
    6·2 answers
  • Network topology is a direct representation of
    9·1 answer
  • Now now now now mowewweedeeee
    13·1 answer
  • What is the most common type of storage device for transferring files from one computer to another?
    10·1 answer
  • Impromptu speaking ability is very important in the workplace to clearly and effectively communicate ideas. An effective impromp
    8·2 answers
  • Fill in the blanks with the correct words.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!