1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valentinak56 [21]
2 years ago
5

..........................................

Computers and Technology
2 answers:
Scilla [17]2 years ago
7 0

Answer:

jhhgvjgfhvbnbjvjn

Explanation:

Anton [14]2 years ago
5 0

Answer:

nice

Explanation:

You might be interested in
I NEED SOME MAJOR HELP W/ THIS!!! PLSSS. WHOEVER HELPS GETS 80 POINTS!!! I NEED IT DONE SOON! TYY <3;)
Oksanka [162]

Answer:

I probably won't awnser them all but I'll try my best

Explanation:

Hacking is a breach of privacy online usually caused by some kind of malware injected into your device there's multiple types of this program or files malware which simply damages and harms your device. A Trojan horse is a program which tricks you by selling you a fake product which has code in it which has code which gives the hacker remote access to your device this program is usually free and masked like a crack or patch of a certain program. U got the second an third question with this one so u can just divide it into pieces. Piracy is Hacking but this time the hacker is stealing ur information through the malware. Invasion of privacy can have multiple forms online and offline. Online intrusion is when a service gives out information you entrust to it while off line Intrusion is stalking trespassing blackmail etc.

4 0
3 years ago
Write a program that uses an "if" statement to determine if the number is greater than one. If the number is greater than 1, the
Vsevolod [243]

Answer:

if(i>1)

{

Console.WriteLine(i*i);

Console.WriteLine(i*i*i);

}

Explanation:

This is written in C#, and it's probably not as clean as it could be. I'm not sure what language you wanted it in, so I just picked the one I'm most familiar with.

7 0
2 years ago
Choose the term that completes the sentence.
klio [65]

Answer: BUBBLE SORT

I hope I've been helpful to you.

6 0
3 years ago
Read 2 more answers
Anybody remember that football game that everyone used to play during school
fiasKO [112]

Answer:

Like an actual video game or the one where you would play during recess then get in trouble when someone got hurt

Explanation:

6 0
3 years ago
A memory page containing a heavily used variable that was initialized very early and is in constant use is removed, then the pag
kompoz [17]

Answer:

C. FIFO

Explanation:

The first-in, first-out (FIFO) page replacement algorithm is a low-overhead algorithm that requires work on the part of the operating system. On a page fault, the frame that has been in memory the longest is replaced.

Using FIFO algorithm implies that

a page which was brought into memory first will be removed first since variable was initialized very early. it is in the set of first in pages that will be removed.

It is the simplest page replacement algorithm. The operating system keeps track of all pages in the memory in a queue, the oldest page is in the front of the queue. When a page needs to be replaced page in the front of the queue is selected for removal that is first in first out.

A memory page containing a heavily used variable that was initialized very early and is in constant use is removed, then the page replacement algorithm used is called First In First Out.

7 0
2 years ago
Other questions:
  • For a color display using 8 bits for each of the primary colors (red, green, blue) per pixel, what should be the minimum size in
    6·1 answer
  • Bit stream methods commonly use algorithm functions like the exclusive or operation (__________.
    11·1 answer
  • To see a custom, object-specific action on the palette of the page layout editor: A. Click Layout Properties on the page layout
    11·1 answer
  • In the single-site processing, single-site data (SPSD) scenario, all processing must be done on the end user's side of the syste
    10·2 answers
  • Which tables and fields would you access to determine which book titles have been purchased by a customer and when the order shi
    15·1 answer
  • 2 (01.01 LC)
    5·1 answer
  • Why was Apple the best company of 2019??
    15·2 answers
  • IDE devices require the use of a controller mounted on the motherboard. True False
    14·2 answers
  • Who has gotten a random file link from someone? What file does it contain?
    8·2 answers
  • Test if value is not less than 13.6.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!