1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vlad [161]
3 years ago
6

What is the output for the following program?

Computers and Technology
2 answers:
Rainbow [258]3 years ago
5 0
The output of the program is=6
Vladimir79 [104]3 years ago
4 0
The output of the program is numb = 6
You might be interested in
Which of the following is an example of constructive criticism for a friend who speaks too softly?
Dmitry [639]
C is correct..

Please vote my answer branliest! Thanks.
8 0
3 years ago
Read 2 more answers
The _____, a subcortical brain structure crucially involved in storing new information in memory, is smaller in people with schi
pashok25 [27]

Answer:

The hippocampus, a subcortical brain structure crucially involved in storing new information in memory, is smaller in people with schizophrenia and their first-degree relatives (parents and siblings) than in control participants.

6 0
3 years ago
1. Describe how research and development influence design. Cite specific examples of how research and development influence desi
vladimir1956 [14]

Answer:

so i research and found this,

Development is when findings of a research are utilized for the production of specific products including materials, systems and methods. Design and development of prototypes and processes are also part of this area. Engineering is utilization of these plans and research to produce commercial products.

4 0
3 years ago
Natalie enjoys talking to people and helping them with their problems. Her friends always tell her that she’s a good listener. B
Akimi4 [234]

Answer:

C and D

Explanation:

The other 3 answers don't even involve talking.

7 0
3 years ago
Read 2 more answers
_________ is a hybrid cryptosystem that combines some of the best available cryptographic algorithms and has become the open-sou
Maurinko [17]

Answer:

The correct answer is PGP i.e  "Pretty Good Privacy" .

Explanation:

Pretty Good Privacy is an encryption algorithm that gives the database interaction with the confidentiality and authorization.Pretty Good Privacy is security algorithm which gives the security into the mail . login ,decryption ,encryption are the example of the "Pretty Good Privacy" .

Pretty Good Privacy  is a type of  hybrid cryptosystem that incorporates cryptographic algorithms and it has de facto open source standard for the mail and the file storage .

3 0
3 years ago
Other questions:
  • Explain what all sensory receptors have in common.
    14·1 answer
  • Why is Abraham called the Father of Believers?
    6·1 answer
  • you just bought a new hard drive for your computer you plan to use this as a second hard drive to store all your you made files
    6·1 answer
  • Why is population composition by age important give reason​
    13·1 answer
  • When working on developing an ability, it is important to get feedback to know how you are doing.
    6·1 answer
  • What is copy and paste?
    13·2 answers
  • How is primary storage different from secondary storage? Select the TWO correct statements.
    12·1 answer
  • Computing devices translate digital to analog information in order to process the information
    12·1 answer
  • Convert the following denary numbers into binary using 8-bit register:
    6·1 answer
  • What is the role of computer in education sector?​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!