1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sergio039 [100]
3 years ago
13

QUESTION 4

Computers and Technology
1 answer:
Kaylis [27]3 years ago
4 0

Answer: 2, 3, 6, 8

Explanation:

i must tell you something very important.

in LISTS.... the FIRST thing is marked with a 0.

[0, 1, 1, 2, 3, 6, 8, 13, 21, 34]

[0, 1, 2, 3, 4, 5, 6, 7, 8, 9]

do you see how these line up with each other?

the output would be 2, 3, 6, 8

You might be interested in
Ok so um does anyone know how i can use a divided by sign on computer?
Maslowich
You can just put “/“ to represent dividing
6 0
3 years ago
Read 2 more answers
Eureka! Is a telephone and Internet-based concierge service that specializes in obtaining things that are hard to find (e.g., Su
svetoff [14.1K]

Explanation:

Should the company separate its voice and data needs, using standard analog services for voice but finding some advanced digital transmission services for data ($40 per month for each voice line and $300 per month for a circuit with 1.5 Mbps for data)?

8 0
2 years ago
In the context of computer crimes, those who attempt to destroy the infrastructure components of governments and financial insti
elixir [45]

In the context of computer crimes, those who attempt to destroy the infrastructure components of governments and financial institutions are known as <u>d. cyber terrorists</u>.

<u>Explanation</u>:

Cyber crime means crime committed with the help of computer and internet. Cyber terrorism means crime that causes damage to infrastructure components of financial institutions and government office and causes threat to the society.

Cyber terrorists are person who involve in cyber terrorism. The systems used in the governments and financial institutions should be protected with hardware and software to avoid cyber terrorism.

This kind of cyber terrorism is very dangerous, as they hack the system and destroy the valuable information stored in it.

5 0
3 years ago
How computational thinking skills impact software design and the quality of the software applications produced?
IRINA_888 [86]

Answer:

 Computational thinking skills basically provide the ability and capability to lean the computer programming language and its also plays an important role in the software designing process. It also helps in improve the quality of various types of software application in programming world.

The computational thinking provide various types of benefits in the software application is that it breaks the complex system problem into the small parts so that it can easily managed.

It helps on focusing only on the important and effective information or data and ignore the irrelevant information in the software designing process and applications.  

5 0
3 years ago
When planning a comprehensive security system, the first step is designing _____, which use a combination of hardware and softwa
Brums [2.3K]

Answer:

Fault tolerant system

Explanation:

Fault tolerance is the property that keeps a system operating properly in the event of a failure of one of the components within the system

A fault tolerant system enables the system to continue its operation possibly at a reduced level, rather than having the whole system breakdown.

A good security expert understands the need for fault tolerance in a comprehensive security system, as the absence of this can lead to serious security breaches once the whole system is down.

6 0
3 years ago
Other questions:
  • Change control in application development is a formal process for changing written documentation into online documentation, and
    13·1 answer
  • What are the most popular/up-and-coming social media applications?
    10·2 answers
  • What special member function of a class is called whenever an instance of a class is created and initialized?
    15·1 answer
  • A computer retail store has 15 personal computers in stock. A buyer wants to purchase 3 of them. Unknown to either the retail st
    14·1 answer
  • The movement of the economy through highs and lows is referred to as:
    11·1 answer
  • A form’s height is ______________________.<br><br> A property<br><br> A method<br><br> An event
    10·1 answer
  • What is the job of a bootloader?
    10·2 answers
  • Indentation is useful to make the document easier to read. To increase the indentation of the paragraph, you press the increase
    10·1 answer
  • Modify the Comments.java program from Programming Exercise 1-10 so at least one of the statements about comments is displayed in
    10·1 answer
  • Write a factorial method that takes in an integer as input, recursively computes its factorial using BigInteger and return a Big
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!