1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Luba_88 [7]
3 years ago
7

How do i work this out? does anyone do programming?

Computers and Technology
1 answer:
Pavlova-9 [17]3 years ago
6 0
Answer : No sorry ..
You might be interested in
What is the name of the first practical asymmetric cryptosystem that was created?
victus00 [196]

Answer:

I think the name is RSA

4 0
3 years ago
Please answer fast computer picture above​
Bas_tet [7]

Answer:embedded computers are found in cats, appliances like light switches and voic actived tvs, security cameras, dvd players and elevators

Explanation:

5 0
2 years ago
Do you know how i can text my mom (and tell my mom to tell dad) that i want to get a new phone and get my ipad back without it b
posledela

You can clean your room, do chores without being told, and being nice to your siblings, or being very helpful around your house. I don't have social media myself, but from what I know, you just have to follow the directions correctly on the site or ask a friend. Plze mark me brainiest:) Hopefully this was helpful:)

7 0
3 years ago
Give five examples of top level domain​
coldgirl [10]

Answer:  .com — Commercial businesses.

.org — Organizations (generally charitable).

.net — Network organizations.

.gov — U.S. government agencies.

.mil — Military.

.edu — Educational facilities, like universities.

Explanation:

5 0
2 years ago
Read 2 more answers
The _______ number system allows digital devices to represent virtually any number simply by using 0s and 1s.â
zhuklara [117]
The answer is <span>Digital data 

</span>
4 0
3 years ago
Other questions:
  • Changing the configuration of a database falls under which category of databaseâ administration?
    15·1 answer
  • When is e-mail an appropriate channel for goodwill messages? If you frequently communicate with the receiver by e-mail and are c
    15·1 answer
  • Who ever likes Pokemon an wants to help me please comment and I will Give the room for My Assignment
    9·1 answer
  • Why is a high-quality bond typically considered a lower-risk investment than a stock
    10·2 answers
  • How can parents be health educators in family​
    13·1 answer
  • Multiple arrays. Jump to level 1 For any element in keysList with a value greater than 40, print the corresponding value in item
    7·2 answers
  • When using correct ergonomic technique be sure to _____.
    11·2 answers
  • Write a program. Commence the change to be dispensed from a vending machine. An item machine can cost between $0.25 send a dolla
    9·1 answer
  • Please select the word from the list that best fits the definition<br><br> Plagiarism
    5·2 answers
  • A computer is the __________ of an attack when it is used to conduct an attack against another computer.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!