1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetlanka [38]
3 years ago
12

Preciso de ajudar para resolver esse exercício, é para amanhã cedo!! Em Dev C++

Computers and Technology
2 answers:
omeli [17]3 years ago
5 0
Pues es Bbbbbbbbbbbb b de bebé
LenKa [72]3 years ago
3 0
Bbbbbbbbbbbbbbbbbbbbbb
You might be interested in
Sql statements that define the objects such as tables, indexes, triggers, etc. in a database are referred to as _______________
tatuchka [14]
Source statements i hope this helped

3 0
3 years ago
??????????????????????????
suter [353]

Answer:

procedimento

Explanation:

faz se a montagem conforme mostra a figura.

6 0
3 years ago
In this assignment, you will need to design a complete Black-Box testing plan for the following program. A computer science stud
murzikaleks [220]

Answer: sorry i need points to ask a question hope u understand...

Explanation:

8 0
3 years ago
Express 0.000357 in standard form ​
USPshnik [31]

Answer:

0.000357 this is standard form

hope this helps

have a good day :)

Explanation:

0.0003+0.00005+0.000007= expanded form

8 0
3 years ago
A device that is connected to a network that is identified by a unique number and works as an individual part of the network is
VMariaS [17]
Cellular phone? I'm pretty sure

7 0
3 years ago
Other questions:
  • Your company runs a commercial website that enables your business partners to purchase products and manage their accounts. You w
    9·1 answer
  • To what device, inside the computer, do all other devices connect
    10·2 answers
  • Subnetting is accomplished by borrowing bits from the _____ portion of an ip address and reassigning those bits for use as netwo
    13·1 answer
  • What is Administrator windows 10
    8·1 answer
  • What does the following code segment do?
    13·1 answer
  • Anna wants to keep information secure from offenders. Which software should she install on her computer to ensure Internet safet
    13·1 answer
  • Want to be friends on my switch? here :)! friend code: SW-5635-3847-1397​
    13·2 answers
  • William created a spreadsheet and he would like to enter the data he collected. What information should he put in the first row?
    15·1 answer
  • Hadley made a plan that after downloading the Eclipse IDE, she would disable her security program, extract and install Eclipse,
    10·1 answer
  • What program command saves a copy of a file under a different name
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!