1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marin [14]
3 years ago
6

Consider the following code:

Computers and Technology
1 answer:
Deffense [45]3 years ago
8 0

Answer:

The output of C is 102.

100 + 1 + 1 = 102

You might be interested in
Ou have just set up a network that will use the tcp/ip protocol, and you want client computers to obtain ip configuration automa
Aleks [24]
DHCP (Dynamic Host Configuration Protocol)
5 0
2 years ago
Data mining is defined as: a)Separating data and programs such that each can be changed without changing the other b)Allowing ma
nikitadnepr [17]

Answer:

C

Explanation:

In simple words, data mining is defined as a process used to extract usable data from a larger set of any raw data. It implies analysing data patterns in large batches of data using one or more software.

7 0
3 years ago
Which access object cannot be used to enter or edit data
kap26 [50]

Answer:

Should be B. table !

6 0
1 year ago
Read 2 more answers
in your own ideas what are the disadvantages of participating in a videoconference write your answer inside the circle​
ipn [44]
Some disadvantages of taking part in a video-conference are:

1) Lack of communication from social cues (social cues are what we use to see if someone is in a good or bad mood)

2) There is a high chance of unstable network connection.

3) Technical and personal issues because not everyone is comfortable speaking on a video-conference platform.

4) It causes more stress due to the lack of organization when preparing meetings (because it’s so easy to just get on a device without preparing anything beforehand).

Hope this helped!
5 0
2 years ago
What are some local storage devices?​
german

Pendrive, CD is local storage divices

8 0
3 years ago
Other questions:
  • In this code, identify the repeated pattern and replace it with a function called month_days, that receives the name of the mont
    14·1 answer
  • Write a converter program for temperatures. This program should prompt the user for a temperature in Celsius. It should then con
    10·1 answer
  • 1.
    13·1 answer
  • How does netbios identify a computer system on the network?
    13·1 answer
  • Which statement describes how to insert the IF, COUNTIF, or SUM function into a cell?
    11·1 answer
  • What is the answer to 4.9 Code Practice: Question 2
    14·1 answer
  • Which insert image option allows a user to compile, modify, and add captions to images?
    5·2 answers
  • How do we find the time complexity for this algorithm?
    6·1 answer
  • Sftp uses which mechanism to provide security for authentication and data transfer?
    7·1 answer
  • The users, groups, and roles that have access to a server are called ______________________________.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!