1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Llana [10]
3 years ago
9

Which of the following IS an operating system? * Reddit Ubuntu Office 365 Mac Pro

Computers and Technology
1 answer:
Lorico [155]3 years ago
7 0

Answer:

Ubuntu

Explanation:

Ubuntu is built on the Linux shell and is an operating system. Mac pro is a laptop model, the rest are software / websites

You might be interested in
What's one item in your house that represents you
djverab [1.8K]

Answer:

my bed hahaha........

4 0
3 years ago
Read 2 more answers
Which of these Logic Statement's are correct for the following diagram? *
Solnce55 [7]

Answer:

A AND B OR C

Explanation:

7 0
3 years ago
Spam is _____.
AfilCa [17]
Multiple answers. Attachment and practice of sending unwanted messages
6 0
3 years ago
Read 2 more answers
In a real-world environment, changing granularity requirements might dictate changes in primary key selection, and those changes
scoray [572]

In a real-world environment, changing granularity requirements might dictate changes in primary key selection, and those changes might ultimately require the use of surrogate keys.

Explanation:

A surrogate key is a unique identity as an object or entity. It is used as an object in the database and as an entity in the modern world. Surrogate key is not a natural key hence it cannot be derived from application data.

Advantages of using surrogate key:

  • They are unique
  • They have uniform rules
  • It allows unlimited values
  • It stands the test of time
3 0
3 years ago
Write a C++ program to find K largest elements in a given array of integers. For eeample, if K is 3, then your program should ou
Anon25 [30]

Answer:

// C++ program to find k largest elements in the array

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

// variable

int n,k;

cout<<"Enter the number of elements of array:";

// read the value of n

cin>>n;

// declare the array of size n

int arr[n];

cout<<"Enter the elements of array:";

// read the elements of array

for(int a=0;a<n;a++)

{

   cin>>arr[a];

}

cout<<"Enter the value of K:";

cin>>k;

// call the function to perform selection Sort

sort(arr, arr+n);

cout << k<<" largest elements of the array are: ";

// print k largest elements of the array

for (int i=n-1; i>n-k-1; i--)

cout << arr[i] << " ";

return 0;

}

Explanation:

Read the number of elements in the array.Then create an array of size "n" and read  n elements of the array.Sort the array in ascending array.Then Read the value of  k from user.Find the k Elements from the end of the array.This will be the k  largest elements of the array.

Output:

Enter the number of elements of array:8                                                                                    

Enter the elements of array:34 8 75 99 12 7 5 55                                                                          

Enter the value of K:3                                                                                                    

3 largest elements of the array are: 99 75 55

4 0
3 years ago
Other questions:
  • Why is Copyright important?
    5·1 answer
  • The keyboard, mouse, trackpad, microphone, light pen, and voice recognition are examples of _____ devices.
    5·1 answer
  • Which passage form the passage best contributes to elisa impatient tone
    8·1 answer
  • If a student is looking for the degree symbol (°) and it is not found on the main drop-down of symbols, what should the student
    9·2 answers
  • Suppose a worker needs to process 100 items. the time to process each item is exponentially distributed with a mean of 2 minutes
    5·1 answer
  • ​​most code division multiple access (cdma) networks conform to ____________ , created by the telecommunications industry associ
    10·1 answer
  • You've been hired by Maple Marvels to write a C++ console application that displays information about the number of leaves that
    5·1 answer
  • What kind of music you guys play
    5·2 answers
  • Does putting a glue stick on your touchpad make it stop working pls help
    10·1 answer
  • attackers typically use ack scans to get past a firewall or other filtering device. how does the process of an ack scan work to
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!