1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lisa [10]
3 years ago
9

Jjhb ft fv tuning Denise l Debbie

Computers and Technology
1 answer:
Vitek1552 [10]3 years ago
7 0
What








What the debbie



You might be interested in
Write a function called cipher(phrase,shift)that accepts two parameters: a string phrase and an integer shift.The integer shift
Aleks [24]

Answer:

Following is given the code according to requirement.

The code is attached as an image so that the indentation is understood by the user. Comments are given inside the code where necessary.

The output of code is also attached as well  in end.

I hope it will help you!

Explanation:

7 0
2 years ago
Andrew is graduating from high school and is very interested in computers and programming. Based on the programming language mar
Anika [276]

Answer:

B. Identify the most popular languages to determine the highest job demand.

Explanation:

You are not here to gain just experience or identify the language that is most compatible with various other languages for various skills. And these programming languages are standards, and hence you are not required to check them for turning completeness tests to meet various programming criteria. The correct option for you will be to identify the most popular languages to determine the highest job demand. And hence, B. is the right option for this question.

5 0
3 years ago
When a computer is the.................of an attack, it is used as an active tool to conduct the attack
BARSIC [14]

Answer:

Attack is an intentional or unintentional act that causes damage or compromises information of systems supporting it.When a computer is the subject of an attack, it is used as an active tool to conduct the attack.

On the other hand, when a computer is the entity being attacked, it is the object of an attack.

3 0
2 years ago
(I WILL MARK BRAINLIST) What are the most important things a student should consider when creating a presentation on something t
lapo4ka [179]

Answer:

TOPIC

Explanation:

because if you dont have topic you cant create a presentation or a project that you will pass to your class,and if you have a topic present it neatly because you presentation or your project will be graded.

5 0
2 years ago
Read 2 more answers
How to start to study computer science
yuradex [85]
Start to study about hardwware parts of computer,software, numbersystem, multimedia, programming
5 0
3 years ago
Read 2 more answers
Other questions:
  • Kai is a software engineer who started his own IT consulting firm. His friend, Catalina, is the owner of a store that sells offi
    13·2 answers
  • Select all that apply.
    10·1 answer
  • Write a program which:
    10·1 answer
  • Barbara has three computers connected to the same network in her home. What
    15·1 answer
  • Two system administrators who work in two different buildings for the same company want to open a communication channel between
    8·1 answer
  • Define the function max2 that takes two integers as arguments and returns the largest of them. Then define the function max_list t
    11·1 answer
  • Video is a medium that's looks real anyways, but is real________________.
    10·1 answer
  • GIVING BRAINLIEST
    15·1 answer
  • PLEASE ANSWER AND HURRY I'LL MARK YOU BRAINLIEST!!<br><br><br>​
    9·1 answer
  • ________ is the general name for a security flaw in a program. Group of answer choices A security fault A virus Malware A vulner
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!