1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anestetic [448]
3 years ago
12

HURRRY WILLL GIVE BRAINLIST!!!!!!

Computers and Technology
1 answer:
Flura [38]3 years ago
8 0

Answer:

true

Explanation:

the best way to learn is take notes eaverytime

some one trying to teaching you some

You might be interested in
What is the difference between (IF instructions &amp; WHILE instructions )<br> 0<br> 를 들<br> T<br> !
lara31 [8.8K]

Answer:

While statements determine whether a statement is true or false. If what’s stated is true, then the program runs the statement and returns to the first step. If what’s stated is false, the program exits the while and goes to the next statement. An added step to while statements is turning them into continuous loops. If you don’t change the value so that the condition is never false, the while statement becomes an infinite loop.

If statements are the simplest form of conditional statements, statements that allow us to check conditions and change behavior/output accordingly. The part of the statement following the if is called the condition. If the condition is true, the instruction in the statement runs. If the condition is not true, it does not. The if statements are also compound statements. They have a header (if x) followed by an indented statement (an instruction to be followed is x is true). There is no limit to the number of these indented statements, but there must be at least one.

7 0
3 years ago
Which type of document would be best created in Word?
givi [52]

Answer:

it would be Animation I declare

6 0
2 years ago
Match the function to its purpose.
schepotkina [342]

Answer:

  • Median :Calculates the average of the two  numbers in the middle of a set of even count of numbers.
  • Mode : This function shows the most frequently  occurring number in a set of numbers
  • Standard deviation : You can see how far each number  varies, on average, from the average  value of the list
  • Rank : With this function, you can determine  the position of a number in an  unarranged array or set.

Explanation:

8 0
4 years ago
As you move through your professional career, you will receive requests for favors and contributions. You will not be able to ho
Alika [10]

Growing professionally comes with advises, comments (solicited and unsolicited), request for favours and also contributions. Moving up your professional career from the days of little beginning have always been accompanied with all of the requests and comments. As one levitates successfully, requests and contributions tend to increase. This can be scary and at the same time tiring as you go to question the sensibility of some of your decisions. While being inundated with these ’assistance', it is important that you carefully and thoroughly select the comments, contributions, requests of favours etc that is worth responding to. While some would be considered others will be discarded. Now, the question is how best can we politely turndown a person's request of favours and contributions without sounding rude, ungratetul and condescending. Both useful and irrelevant contributions deserve good responses. We could start by appreciating the request for favours and contributions, and tell whomsoever it may concern that you appreciate his/her assistance but unfortunately would not be needing them.

8 0
4 years ago
A ____________would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a_____________
seraphim [82]

Answer:

The answer to this question is vulnerability and risk.

Explanation:

Vulnerability is there us misconfiguration in the system  and we know that our system is vulnerable means the hacker can gain unauthorized access to our system.

Risk is when there are chances that a misconfiguration  might happen in our system in future so that hacker could gain unauthorized access to the system.

7 0
3 years ago
Other questions:
  • How can social media be used in "child-driven" education? What benefits can students around the world gain from social media?
    12·1 answer
  • In traditional programming, probably the most often used error-handling outcome was to ____.
    15·1 answer
  • A form of speech used by a speaker who is attempting to be witty and amusing is _________.
    13·2 answers
  • Checking authentication, checking authorization and access control, auditing systems, and verifying firewalls and other filters
    12·1 answer
  • How are cars made in georgia
    15·1 answer
  • Help me for this question
    8·1 answer
  • In order to generate a random number, you must use Math.random( ). Group of answer choices True False
    9·1 answer
  • PLEASE HELP 17 POINTS AND ILL MARK BRAINLIEST IF CORRECT , DONT GUESS
    13·1 answer
  • What is the difference between computer hardware and computer software?<br>​
    10·1 answer
  • What is the minimum number of different résumé formats that an individual should have prepared?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!