1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
QveST [7]
3 years ago
8

⡯⡯⡾⠝⠘⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢊⠘⡮⣣⠪⠢⡑⡌

Computers and Technology
2 answers:
KiRa [710]3 years ago
7 0

Answer:

nice................

Damm [24]3 years ago
5 0

Answer:

24

Explanation:

You might be interested in
Why did they removed the watch video button to view answers?​
MA_775_DIABLO [31]

Answer:

Umm I’m not sure

Explanation:

7 0
3 years ago
Write an algorithm which gets a number N, and prints all the natural numbers less than or equal N. 3.
oksian1 [2.3K]

Answer:

Algorithm:

1.Create a variable N.

2.Read the value of N from user.

3.for i=1 to N.

 3.1 Print value of i.

4.end program.

Implementation in C++:

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

// variable

int N;

cout<<"Enter value of N:";

// read the value of N

cin>>N;

cout<<"Natural number from 1 to "<<N<<" are:";

for(int i=1;i<=N;i++)

{

// print the numbers

   cout<<i<<" ";

}

return 0;

}

Output:

Enter value of N:6                                                                                                        

Natural number from 1 to 6 are:1 2 3 4 5 6

3 0
3 years ago
Which of the following does not reflect the second step of effective communication?
Ilya [14]

Answer:

c

Explanation:

3 0
3 years ago
Read 2 more answers
Latent data is which of the following?
Levart [38]
Generally invisible to the user, like you can't see it on your OS or in just a standard application
8 0
3 years ago
Read 2 more answers
What will modern technology be like in 20 years
FinnZ [79.3K]
Your answer is A if I’m not mistaken
4 0
4 years ago
Other questions:
  • Preserving confidentiality, integrity, and availability of data is a restatement of the concern over interruption, modification,
    15·1 answer
  • What do you call the combination of title, description, tags, and thumbnail?
    6·1 answer
  • Excel solver is the only method that one can utilize for automated linear programming solutions. True or False
    8·1 answer
  • _______ _____ is the process of creating usable computer pograms and applications and the theories behind those processes. Quest
    13·2 answers
  • You can use this effect to break a color into a percentage of its full strength.
    13·1 answer
  • Where do deleted files go?
    7·2 answers
  • Using data from the BITS database, define a view named TopLevelClient. It consists of the number, name, address, balance, and cr
    9·1 answer
  • hich of the following is a disadvantage of online surveys? They result in high response bias They lead to higher cost per comple
    14·1 answer
  • Use the Bisection Method to find the root 2. Write a main program and a function program 3. Main Program a. define constants b.
    9·1 answer
  • The rhythmic note that three beats is called a____half note.
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!