1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pshichka [43]
3 years ago
13

I try to make an account so I can have some help, but it always says "We’re sorry, but we are not able to complete your registra

tion at this time.". I put in all the info and everything! What do i do?
Computers and Technology
1 answer:
Romashka-Z-Leto [24]3 years ago
8 0

Answer:

that keeps happening to me too i sent them a email and they said they are trying to fix it

You might be interested in
Things stored in a computer ram __________.
kirza4 [7]
B.cannot be accessed from the GUI
8 0
3 years ago
In the value chain concept, upgrading IT is considered what kind of activity?
ANTONII [103]

Answer:

Upgrading IT is considered as B. Support activity

Explanation:

It is considered as support activities because they help the primary activities move smoothly and consistently.

For example, efficient communication between a particular firm and its subsidiaries will be extremely difficult without the necessary IT infrastructure, which will slow down the primary activities that are to be carried out.

6 0
3 years ago
Before your shell forks a new process to call execvp(), it should parse the input string and separate it into a collection of su
kompoz [17]

Answer:

#define LSH_RL_BUFSIZE 1024

char *lsh_read_line(void)

{

int bufsize = LSH_RL_BUFSIZE;

int position = 0;

char buffer = malloc(sizeof(char) bufsize);

int c;

if (!buffer) {

   fprintf(stderr, "lsh: allocation error\n");

   exit(EXIT_FAILURE);

}

while (1) {

   // Read a character

   c = getchar();

   // If we hit EOF, replace it with a null character and return.

   if (c == EOF || c == '\n') {

     buffer[position] = '\0';

     return buffer;

   } else {

     buffer[position] = c;

   }

   position++;

   // If we have exceeded the buffer, reallocate.

   if (position >= bufsize) {

     bufsize += LSH_RL_BUFSIZE;

     buffer = realloc(buffer, bufsize);

     if (!buffer) {

       fprintf(stderr, "lsh: allocation error\n");

       exit(EXIT_FAILURE);

     }

   }

}

}

Explanation:

3 0
3 years ago
HELLO!!!! For instance, will we get an error if we put a space after the word “print” and before the opening parenthesis in pyth
IceJOKER [234]

In python, spaces in the sense you're talking about, dont matter. For instance,

print ( "hello") will run the same as print("hello")

But, you cannot put a space before the print statement. That's called indenting. You are only supposed to indent code that is inside loops, if-elif-else statements, and functions.

7 0
3 years ago
You were hired as a systems analyst by a small independent publishing firm. This firm has been specialized in paperback books, a
garri49 [273]

Answer:

To ensure continual user involvement, I will employ a user-centered design system.

This system requires that I gather data from users and incorporate findings into the inventory systems design.  The purpose is to create user-friendly inventory  and information distribution systems.

To achieve this, I will try to understand the users of the systems, the users' tasks, and the users' work environments.  Then, I will evaluate the user requirements based on current and future needs.  I will address the user requirements and continuously involve the user in the design and development of the systems.

Explanation:

The deployment of user-centric design is to achieve project success.  Using this approach will also save design and development time, cut design and development costs, and improve user satisfaction.  This approach will also help me to understand the user needs and requirements and help the users to understand the newly developed systems.

4 0
3 years ago
Other questions:
  • A programmer wrote the program below. The program uses a list of numbers called numList. The program is intended to display the
    7·1 answer
  • Which type of operation writes the file system structure to the disk?
    5·1 answer
  • All of the following are typical characteristics of internet predators, except white. male. between the ages of 18 and 35. high
    7·1 answer
  • Document could not be saved bad file handle
    8·1 answer
  • What does CRM stand for?
    10·1 answer
  • In Excel you insert a comment in a worksheet by using the ____ tab on the Ribbon.
    10·1 answer
  • Https://www.bing.com/videos/search?q=dancing+aaron+smith+1+hour&view=detail&mid=C6C28AF3C0CEC1E4AEE3C6C28AF3C0CEC1E4AEE3
    14·1 answer
  • What is malware? a type of virus that spreads through a network connection a type of virus that targets programs and files any p
    8·1 answer
  • In the ( ) Model, each in a network can act as a server for all the other computers sharing files and acsess to devices
    11·1 answer
  • Question 1 (1 point)
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!