1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rodikova [14]
3 years ago
10

Scenario:

Computers and Technology
2 answers:
lyudmila [28]3 years ago
7 0

Answer:

B

Explanation:

erik [133]3 years ago
5 0

Answer:

She wanted to impress her friends with the latest phone.

Explanation:

Edu 2021

You might be interested in
Write the code to call a function named send_variable and that expects a single int parameter. Suppose a variable called x refer
NemiM [27]

Answer:

<em>#include <iostream></em>

<em>using namespace std;</em>

<em>//function definition</em>

<em>void send_variable(int num){</em>

<em>    cout<<"The Number is "<<num<<endl;</em>

<em>}</em>

<em>// main function begins here</em>

<em>int main()</em>

<em>{</em>

<em>    int x =15; //declares an it variable and assigns 15</em>

<em>    // Calls the function send_variable</em>

<em>    send_variable(x);</em>

<em>    return 0;</em>

<em>}</em>

Explanation:

Using C++ programming language we created the function called send_variable and in the main function we call this function which only displays the value of an int variable passed unto it.

6 0
3 years ago
Self-disclosure is most likely to occur _____________.a.
Feliz [49]

The answer is..

C.  During one-on-one conversations

4 0
3 years ago
Read 2 more answers
In what type of attack does the adversary leverage a position on a guest operating system to gain access to hardware resources a
il63 [147K]

Answer:

VM escape attack

Explanation:

<em>In a VM escape attack, the attacker exploits hypervisor vulnerabilities to gain control over resources reserved for other guest operating systems. Services operating on the guest may be exposed to the other attacks, but such attacks can only access data allotted to the same guest. In the event of a buffer overflow or directory traversal or the client in the case of cross-site scripting.</em>

6 0
2 years ago
Rewrite following program using for loop no=3456 while no&gt;0 : print(no%10) no=no/10
PtichkaEL [24]

Answer:

no=3456  

for x in reversed(str(no)):

 print(x)

Explanation:

If you turn the number into a string and then reverse it, you can achieve the same output.

8 0
3 years ago
Read 2 more answers
Why is it difficult to enforce laws against intellectual theft?
Mnenie [13.5K]

Answer:

The best answer is: all intellectual theft occurs online and through digital networks.

Explanation:

<em>Because the implementation is online and through the network, it is difficult to monitor and justify the safety of the victim and the theft. Internet is widely available to all individuals who has access to it. No matter what is the age, gender and nationality of the victim. It is difficult to maintain a law with its very wide scope and the audiences involved. </em>

3 0
3 years ago
Other questions:
  • Why are some studs and bolts undercut in the middle?
    11·1 answer
  • What is a method to exit wordprocessing software
    14·1 answer
  • Which of these pieces of hardware is used for telecommunication
    12·2 answers
  • A line in the Agile Manifesto reads, "____________ and _____________ over processes and tools". Please select which option best
    9·1 answer
  • This is your code.
    9·1 answer
  • Which term accurately describes agile and devops
    5·1 answer
  • Guys is there a way to watch manga in colour for free
    13·1 answer
  • Assume that two students are trying to register for a course in which there is only one open seat. What component of a database
    12·2 answers
  • Consider the following method substringFound, which is intended to return true if a substring, key, is located at a specific ind
    14·1 answer
  • Which type of photographer documents plants and weather in their natural habitat?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!