1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Harman [31]
3 years ago
10

Hello everyone! can anybody help me? i need help with computing.

Computers and Technology
1 answer:
timurjin [86]3 years ago
7 0

Answer:

a pseu code is a is an artificial and informal language that helps programmers develop algorithms.

Explanation:

You might be interested in
Type the correct answer in the box. Spell all words correctly.
In-s [12.5K]

Answer:

The answer is "Insert tab".

Explanation:

In the presentation slide components constantly refer to the artifacts in many other presentation software from, which you can bring from the inside of a slide. It involves things like forms, texts, images, videos, and even audio files.  

  • This Insert tab can be found at the head of the PowerPoint software in the toolbar.
  • It allows you to modify the slide, and it also provides a feature to count the number of columns and rows in the table.
7 0
3 years ago
How do you record your own video game Music and post Them on yt
Alex777 [14]

Answer:I would try downloading a beat app and making a song,then posting

Explanation:

8 0
3 years ago
Read 2 more answers
Convert 105 decimal to 128 binary form
krok68 [10]

Answer:

1101001 is binary 105

128 in binary is 10000000

6 0
2 years ago
What is the simplest way to permanently get rid of an unwanted file? A. Cancel the file. B. Go to the Start menu and then delete
Morgarella [4.7K]
Go to the Start menu and then delete the file <span>is the simplest way to permanently get rid of an unwanted file</span>
5 0
4 years ago
Which of the following statement is true for Service Request Floods A. An attacker or group of zombies attempts to exhaust serve
klio [65]

Answer:

The answer is "Option A and Option B"

Explanation:

This is a type of attack, which is mainly used to bring down a network or service by flooding large amounts of traffic. It is a high-rate server from legitimate sources, where an attacker or group of zombies is attempting to drain server resources by creating and disconnecting the TCP link, and wrong choices can be described as follows:

In option C, It can't initiate a single request because when the servers were overloaded with legitimate source links, the hacker may then set up and uninstall TCP links.

7 0
3 years ago
Other questions:
  • To create a formula in ____, you would first click in one of the cells.
    15·2 answers
  • The main benefit of shielded twisted pair cabling over unshielded twisted pair is that STP is much more durable.
    13·1 answer
  • Two advantages of Internet are ?​
    7·2 answers
  • A weighted GPA counts__more highly.
    12·1 answer
  • What is an example of CT SO?
    9·1 answer
  • A domain's ____ settings must be configured correctly so that the mail transfer agent (mta) can establish a connection with a re
    15·1 answer
  • The manager of the Super Supermarket would like to be able to compute the unit price for products sold there. To do this, the pr
    13·1 answer
  • What steps should you take if your harassed online​
    9·2 answers
  • Need help asap
    5·1 answer
  • Which answer below is NOT a function of a Data Scientist? O Data Exploitation O Data Strategies O Data Modeling O Data Preperati
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!