1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dmitriy555 [2]
3 years ago
12

C++

Computers and Technology
1 answer:
snow_lady [41]3 years ago
7 0
?............?...?.?????
You might be interested in
Tristan has successfully deleted the blank row. The next thing he wants to do is to increase the length of the first column. A 2
Sonja [21]

Answer:

B

Explanation:

;)

4 0
3 years ago
Read 2 more answers
The weakest hydrogen line stars are classified as:
Ostrovityanka [42]
O is the weakest hydrogen line
7 0
4 years ago
Read 2 more answers
What is output? x = 10 if (x > 10): print(1) elif (x = 10): print(3) else: print(4)
nikdorinn [45]

Answer:

There are three logical operators: and, or, and not. The semantics (meaning) of these operators is similar to their meaning in English. For example, x > 0 and x < 10 is true only if x is greater than 0 and less than 10.

n % 2 == 0 or n % 3 == 0 is true if either of the conditions is true, that is, if the number is divisible by 2 or 3.

Finally, the not operator negates a boolean expression, so not(x > y) is true if (x > y) is false, that is, if x is less than or equal to y.

Explanation:

3 0
3 years ago
Computer forensics is practiced _____. A. Only by specially trained government and law-enforcement personnel B. By many organiza
laiz [17]

Answer:

Option B is the correct answer.

<h3>Computer forensics is practiced by many organizations, including public- and private-sector organizations such as hospitals, law enforcement, and businesses. </h3><h3 />

Explanation:

Computer forensics can be defined as a branch of digital forensics that deals with the evidences and and proofs found on all digital storage media such as computers.

It is basically a step for enhancing security bases of communication. Therefore it is mainly used by law-enforcement personnel but it can also be practiced by other institutions for the purpose of self security.

<h3>I hope it will help you!</h3>
4 0
3 years ago
What is the output of the following?
lys-0071 [83]

Answer: a. the number is: 14

Explanation:

i mean just try to write in 7 instead of x in the second line

then it would say the number is: ....

what is 7 times 2?

14

so the answer is a

5 0
3 years ago
Other questions:
  • Blender questions
    8·2 answers
  • Colleen is creating a document with two minimal paragraphs of text comparing two business models for her company. She decides to
    14·2 answers
  • What is telepresence
    8·1 answer
  • To decrease the size of text so it will fit into a text box without overflowing, select the
    14·2 answers
  • If you have cable internet service, what protocol is used between the head end connection and the cable company's network
    8·1 answer
  • Respecting yourself and others, educating yourself and connecting with others, and protecting yourself and others are all aspect
    11·1 answer
  • What are reserved words in C programming?
    9·1 answer
  • A filter is a camera accessory that is mounted on the optical path of the lens.<br> true or false
    6·2 answers
  • Daniel would like to send a letter to more than one hundred people. He should type each letter separately.
    12·1 answer
  • Which tab do you open to access the Comments feature?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!