1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DochEvi [55]
3 years ago
15

WHAT DO U MEANS BY DIGITAL PROFILE​

Computers and Technology
1 answer:
max2010maxim [7]3 years ago
6 0

Answer:

l don't know ,am so sorry

You might be interested in
To store non-duplicated objects in the order in which they are inserted, use:______
Umnica [9.8K]

Answer:

b. LinkedHashSet

Explanation:

A LinkedHashSet is an ordered version of HashSet that maintains a doubly-linked List across all elements. When the iteration order is needed to be maintained this class is used. LinkedHashSet maintains a linked list of the entries in the set, in the order in which they were inserted.

4 0
4 years ago
4.2 code need help plz someone 15 points if u help
Korolek [52]

def func():  

 total = 0

 while True:

   pet = input("What pet do you have? ")

   if pet == "rock":

     return

   total += 1

   print("You have a {} with a total of {} pet(s)".format(pet, total))

func()

We wrapped our code in a function so that whenever the user enters rock, we can simply return and exit the function. If you have any other questions, I'll do my best to answer them.

8 0
3 years ago
Using hard disk space to temporarily store data or instructions from ram is referred to as the
madreJ [45]
*nix - swap partition
All OS's - swap file[s]
Windows - page file
5 0
4 years ago
Technology and Communications Quiz Active 1 Which of the following inventions has had the greatest impact on sound technology? A
liraira [26]

Answer:

B the tape recorder bec half century later made sonorities not only reproducible but also alterable.

6 0
3 years ago
Which of the following is most likely to be a result of hacking? Group of answer choices slowing of network speed certain Web si
olchik [2.2K]

Answer:

The correct answer to the following question will be "an unauthorized transaction from the credit card of a user".

Explanation:

Hacking was the catch-all word for some form of software misuse or exploitation that violates the protection of someone's computing device for stealing data, corrupting systems or information, manipulating the infrastructure or in some way disrupting related to data-activities.

  • The current popular type involves the phishing scam, whereby hackers or attackers try to obtain username names as well as their passwords or add vulnerabilities to networked processing ecosystems by tricking clients through accessing a mail file or transmitting confidential data.
  • The other options are not related to the given scenario like hacking. So, above it the right answer.
3 0
3 years ago
Other questions:
  • A receiver requires 10nW as input power. If all the system losses add up to 50dB, then how much power is required from the sourc
    15·1 answer
  • Which company is credited with solving a problem by creating a program that could work on all computers?
    11·1 answer
  • What are the changes in ios 14.2? What are the benefits of the ios developer program? What is next for Apple? Base your answers
    14·1 answer
  • How can an administrator force wireless clients to use a standard web browser to provide information, and require a user to agre
    10·1 answer
  • Write a function that removes duplicates from an array. For example, if remove_ duplicates is called with an array containing 1
    15·1 answer
  • how risk can impact each of the seven domains of a typical IT infrastructure: User, Workstation, Local Area Network (LAN), Local
    7·1 answer
  • Can someone please give me some ideas of hooks about negative affects about social media?​
    13·2 answers
  • What is the bleed space in a design?
    8·1 answer
  • I am trying to do a python code quiz for school, the basic requirements for the quiz are: the quiz MUST have 10 questions
    15·2 answers
  • List four safety factors that must be considered when building mine shaft headgear model
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!