1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
guajiro [1.7K]
3 years ago
15

What was the in-app phrase listed as SC answer? A) MasterCard B) No fee C) Apple Pay

Computers and Technology
2 answers:
likoan [24]3 years ago
6 0

Answer:

A.master card

Explanation:

masterCard because

jenyasd209 [6]3 years ago
6 0
SC answer= A) MasterCard
You might be interested in
Google is an example of a(n):
Andre45 [30]
Well i see your X so i would say you were correct it is a search engine.
7 0
3 years ago
The following method is intended to remove all values from the ArrayList a that have the same value as val; however, this method
Alona [7]

Answer:

ArrayList a contains [2, 3, 3, 3, 4, 5, 3, 2, 1]

Explanation:

Given

The removeValue method

Required

The content of ArrayList a, after the method is called

From the question, we understand that arraylist a is:

a= [2, 3, 4, 3, 3, 4, 4, 5, 4, 3, 2, 1]

val =4

The function fails when the value to be removed appear consecutively in the list.

4 appears in index 5 and 6 of the list. Only one of the 4's will be removed

So, the updated list will be: [2, 3, 3, 3, 4, 5, 3, 2, 1]

6 0
3 years ago
Cryptanalysis is made more difficult by having shorter keywords.a) trueb) false
ruslelena [56]

Answer:

B. False.

Explanation:

Cryptanalysis can be defined as the study, art or process of evaluating and analyzing information systems such as ciphertext, cryptographic systems and ciphers. The main purpose of Cryptanalysis is for a better understanding of how the cryptographic system works, in order to find techniques for deciphering, defeating or weakening them without an access to any privileged or secret data (information) required to do so.

Hence, cryptanalysis is made more difficult by having longer keywords as opposed to having shorter keywords which typically would make it easier for an attacker to decipher.

In a nutshell, it is false and incorrect to say that cryptanalysis is made more difficult by having shorter keywords.

5 0
3 years ago
How are computers used in education and entertainment? List them.​
Sliva [168]

Answer:

The answer to this question is given below in this explanation section.

Explanation:

              "computers used in education and entertainment"

Computers started as very and simplistic machines data.Most of these files were text-based reports used in a work environment.As technology advanced,computer became increasingly versatile in what they could do.With the creation of the internet and faster processors,file sharing and entertainment became a popular use for personal computer everywhere.Computer have endless users in the entertainment industry by directly marketing products to users.

  • Music
  • Television and movies
  • Art
  • Games

Many websites services allow users to purchase individual tracks or albums directly to their computer.Most record labels take advantage of these services to makeup for lost revenue from illegal downloading.

When the advantages of video card and internet speed,moving and streaming television are now at the click of a mouse button.Some websites even offer free streaming episodes of certain TV series with internet commercials.

Art is something that is readily available online at any moment. Pictures,Painting,Poetry and more are just a click away.Popular browsers offer specific image search option to quickly browse through art with a single keyword.Beside general use,computer photo editing programs and animation programs are also the sources behind most movies and professional photographs.

6 0
3 years ago
Write a MATLAB code for the following problem:
AysviL [449]
<span>Here is matlab that should work % cos(x) = 1 - (x^2)/2! + (x^4)/4! -(x^6)/6!+(x^8)/8!... % let y= x*x % cos(x) = sum( (-y)^n/(2n)! ) format short x= 0.3*pi; y= x*x; for N= 1:6 n= 0:N; s1= [(-y).^n./factorial(2*n) ] mac= sum(s1); cx= cos(x); str= sprintf('%d terms. series: %12.10f cos(x): %12.10f\n %12.10f',... N, mac,cx, (cx-mac)); disp(str); end;</span>
7 0
3 years ago
Other questions:
  • EDI decreases ______
    15·1 answer
  • A. True <br> b. False: variables represent storage locations in the computer's memory.
    13·1 answer
  • Intuitively, which of the following would happen to e⃗ net if d became very large?
    6·1 answer
  • In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server
    6·1 answer
  • QUESTION
    14·1 answer
  • Define full-duplex. Group of answer choices term used to describe the networking device that enables hosts in a LAN to connect t
    9·1 answer
  • Select the correct answer.
    10·2 answers
  • Makayla is cre iting a brochure for her computer consulting company. She designed the layout and placed a banner containing the
    6·1 answer
  • Discuss why it is important to know the history of social media​
    10·1 answer
  • Does anyone know the answer
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!