1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ad libitum [116K]
3 years ago
13

What is the name of the programming language created by Spu7Nix?

Computers and Technology
2 answers:
Black_prince [1.1K]3 years ago
5 0

Answer:

I think is SPWN

Explanation:

VMariaS [17]3 years ago
3 0
The name of the programming language is “Brainfugd”
You might be interested in
Which of the following is a valid IP address that can be used on the Internet (meaning the public addressing scheme)? Group of a
VladimirAG [237]

Answer:

168.16.1.1 is correct.

Explanation:

168.16.1.1 is the legitimate Internet Protocol address that can be used on the Internet.

Internet Protocol 10.10.1.1 and internet Protocol 172.30.1.1 are the private internet protocol addresses so they could not be used on the internet.

The Internet Protocol 234.1.1.1 has been used as a multicast address so they may not be used on the Internet.

7 0
3 years ago
What is the name of the finned metal device that radiates heat away from the processor?
dezoksy [38]
This is called a "heat sink", essentially, a metal plate makes indirect <span>(its separated by thermal paste)</span> contact with the heat spreader of a cpu (central processing unit). The concept is that the heat sink is made of highly conductive materials thus conducting heat away from the CPU, quite often you'll find a fan attached to further disparate heat away from the heat-sink. These days you'll alternative cooling methods, the most common alternative is to use watercooling (another topic). GPU (graphic processing units) also have heatsinks.    
3 0
3 years ago
Question 4. Use simulate_several_key_strikes 1000 times, each time simulating the monkey striking 11 keys. Compute the proportio
Arisa [49]

Answer:

Chech the explanation

Explanation:

<em>In [16]:</em>

<em />

# Your answer to this question might be written on more than a line.

datascience_trials = make_array()

for  i  in np.arange(1000):

            datascience_trials = np.append(datascience_trials, simulate_several_key_strikes(1))

datascience_proportion = np.count_nonzero(datascience_trials == 'datascience')/1000

datascience_proportion

<em>Out [16]:</em>

0.0

<em>In [17]:</em>

_ = ok.grade('q2_4')

````````````````````````````````````````````````````````````````````````````````````````````````````````

#Running tests

4 0
3 years ago
Automatic red-eye reduction settings work best on which type of flash?
zhuklara [117]

Answer:

c

Explanation:

3 0
3 years ago
An 18 year old female is preparing to go to college in the Fall. She received the 1st dose of HPV and her booster dose of Mening
Elenna [48]

Answer: No, you will not have to determine the exact vaccine that caused the fever and rash. The CDC will determine that information.

Explanation:

To report a vaccine reaction to VAERS you just have to list the symptoms and reactions that were caused after getting a vaccine. The form that is needed to fill out a VAERs can be found on the CDC website. The person filling out the form will need to know the who, when, where, and how of the injury or symptom.

After the form has been received the patient will be contacted and their symptoms will be monitored. Some of the most common reactions after getting a vaccine are;

  • swelling
  • pain
  • redness
  • rash

4 0
3 years ago
Other questions:
  • What are the most popular/up-and-coming social media applications?
    10·2 answers
  • Use the image above to determine which toolbars will be displayed in the program you are using. SELECT ALL THAT APPLY
    11·2 answers
  • You install a teanviewer on your work station at home so that you can access it when on the road. How can you be assured that un
    12·1 answer
  • All states that have altered judicial selection techniques in recent years have adopted some form of:
    5·1 answer
  • Using a "word" of 5 bits, list all of the possible signed binary numbers and their decimal equivalents that are represent able i
    12·1 answer
  • An important goal of biosecurity training is to: Prevent laboratory accidents that could expose personnel to hazardous agents. P
    13·1 answer
  • 15) Three primary activities of a program are: A) Variables, Operators, and Key Words B) Lines, Statements, and Punctuation C) I
    11·1 answer
  • What is an outcome in a game? Don't search google just give me an answer
    9·1 answer
  • Help me with the question please..​
    6·1 answer
  • Additional metadata data is stored alongside the binary colour values for each pixel. Give two examples of metadata?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!