1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tema [17]
3 years ago
15

What is the full form of SAARCAnd free point!! ​

Computers and Technology
2 answers:
posledela3 years ago
4 0

Answer:

your answer is:South Asian Association of Regional Cooperation (SAARC) 

thanks for points have a great day

Ierofanga [76]3 years ago
4 0

Answer:

South Asian Association of Regional Cooperation.

You might be interested in
If the code for CAT is ECV what is the code for DOG? *
masha68 [24]
This seems to be a ROT2 Ceasar cipher. Replace each letter with a letter two places futher in the alphabet. Do the same with DOG and get <span>FQI.</span>
3 0
3 years ago
Read 2 more answers
What would a world where we have 2^128 (340 undecillion) Internet connected devices look like? How could that much Internet usag
cluponka [151]

A world  have 2^128 (340 undecillion) of IPv addresses that helps to connect to the internet. IPv6 addresses can make it easier for working organizational teams connecting to the Internet, IP addresses that are created by IPv6 are 128 bits.

<h3>What is internet?</h3>

Internet is the system  uses the Internet protocol suite (TCP/IP)  and interconnected computer networks that communicate between two or more individuals.

Today, almost 20 IP addresses are taken by7 each home for each electronic device. The internet usage is so wide, that even a simple task  is not possible without it. Even a simple task can be done using internet.

Learn more about internet.

brainly.com/question/13308791

#SPJ1

5 0
2 years ago
Claudette is shocked to discover that her company's data has been stolen, and their Web site shut down, by a malicious ex-employ
liraira [26]

Answer:

The answer is "Ex-employee hack IoT firms from Claudette to access them".

Explanation:

Computer system hacking is only a breach between both the access as well as the stealing or misuse of critical information between both computer software from the target system. In this sense, a malicious attacker uses a computer device or even a network to access or illicitly exploit information.

8 0
3 years ago
A state in which two things are able to exist or occur together without problems or conflict...
VladimirAG [237]

Answer:

Compatibility

Explanation:

that's the definition of compatibility.

4 0
3 years ago
Use set builder notation to describe these sets.
statuscvo [17]

Answer:

a) S1 = { 2^x | x belongs to the set of Whole Numbers}

b) S2 = { 2+3(x-1) | x belongs to Natural Numbers }

c) S3 = { x^2 | x belongs to the set of Natural Numbers  }

d) S4 = { x | x belongs to English Alphabet }

e) S5 = { x | x is a <em>Vowel</em> of English Alphabet}

Explanation:

Whole Numbers = {0, 1, 2, 3, ...}

Natural Numbers = {1, 2, 3, ...}

English Alphabet={a, b, c, d, e, ... , x, y, z }

Vowels of English Alphabet = {a, e, i, o, u}

8 0
3 years ago
Other questions:
  • If memory accesses take 100 times more than register accesses, then a LOAD instruction will take ___ machine cycles than an ADD
    7·1 answer
  • How do i set up a RAID 1 array?​
    6·1 answer
  • Can a msi b450 tomahawk motherboard fit into a darkflash dlm21 mesh micro atx tower
    13·1 answer
  • What is value parameter and reference parameter while things are passed by Also, do a c code to show it
    13·1 answer
  • Do you see traffic flowing from the internet into your system or from your network to the internet? explain why or why not:
    6·1 answer
  • One modeling technique drawn from systems analysis and design that can provide an excellent way to illustrate how a business fun
    13·1 answer
  • If you want to display information from a database to someone who is not a user of the database, you will have to use:
    7·1 answer
  • Read the scenario and then choose which type of
    12·2 answers
  • What are the advanced file and folder search commands?PLEASE GUYS ITS IMPORTANT
    12·1 answer
  • In this lab, you will implement a temperature converter in JavaScript. The user may type a temperature in either the Celsius or
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!