1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ELEN [110]
3 years ago
5

WILL GIVE A BRAINLIEST!!! PLS HELP!!!

Computers and Technology
1 answer:
DIA [1.3K]3 years ago
7 0

Answer:

never gonna give you uppp

Explanation:

criiiiii

You might be interested in
What is a back door?
V125BC [204]

Answer:

A backdoor is a typically covert method of bypassing normal authentication or encryption in a computer, product, embedded device, or its embodiment. Backdoors are most often used for securing remote access to a computer, or obtaining access to plaintext in cryptographic systems.

Explanation:

3 0
3 years ago
Read 2 more answers
Jack is assisting his younger sibling Mary with her mathematics assignment, which includes a study of the number system. Jack ex
Elza [17]

Answer:

The answer is A). Integers

Explanation:

Booleans and Strings don't represent numbers (in most cases) so they can be eliminated.

Floats are used for representing decimals while integers are used for whole numbers.

4 0
3 years ago
Read 2 more answers
Assume that x is a char variable that has been declared and already given a value. Write an expression whose value is true if an
maria [59]

Answer:

^[A-Fa-f0-9]+$

Explanation:

The hexadecimal (Base 16) can contain 0-9, A-F, a-f and any of these can be the part of the Hexadecimal base 16 code.

In python we have the re.match function, and the syntax is as below:

re.match(pattern, string, flag=0). And we can use this function to check whether the entered char variable is a regex or not. Like:

re.match(pattern,x, flag=0)

8 0
4 years ago
On the cities worksheet, click cell f4 and enter a formula that will subtract the departure date (b1) form the return date (b2)
Mademuasel [1]
=(+B2-B1)*F3 is what you need to enter in cell F4
8 0
3 years ago
What is the difference between hollerith and burroughs machine
daser333 [38]

The difference between Hollerith and Burroughs machine is that Hollerith  have a pantograph that is used to create punch cards but the other is different.

<h3>What is a Hollerith machine?</h3>

A Hollerith machine is known to be a kind of a specific type of electromechanical machine that was known to be used as an information-processing resource in all of the early 20th century.

Note that the machine is said to be one that uses a system that has electrical and mechanical signals, and also some set of wires placed over pools of mercury on paper punch cards.

Therefore, The difference between Hollerith and Burroughs machine is that Hollerith  have a pantograph that is used to create punch cards but the other is different.

Learn more about Burroughs machine   from

brainly.com/question/15241347

#SPJ1

6 0
2 years ago
Other questions:
  • When performing actions between your computer and one that is infected with a virus which of the following offers no risk becomi
    5·1 answer
  • In Python, what kind of error is returned by the following code? (e.g. NameError, ValueError, IOError, etc.) def my_func(n1, n2)
    8·1 answer
  • Two technicians are discussing engine valve timing. Technician A says that the optimum valve timing is found through experimenta
    13·1 answer
  • Peter accumulated many photos from his visit to Wisconsin. He wants to upload these photos to a social networking site. Which fi
    12·1 answer
  • Computer virus is a<br> a. software<br> b. hardware<br> c. bacteria<br> d. none of these
    13·1 answer
  • An attacker captures an encrypted message. he tries decrypting with every possible key until the decryption process reveals a se
    14·1 answer
  • Given two complex numbers, find the sum of the complex numbers using operator overloading.Write an operator overloading function
    10·1 answer
  • Determine the number of character comparisons made by the brute-force algorithm in searching for the pattern GANDHI in the text
    7·1 answer
  • How many tables are needed to implement an REA data model that has five distinct entity-sets, two many-to-many relationships and
    6·1 answer
  • While operating a vehicle on any highway of this state, it it illegal to physically hold or support a wireless device with any p
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!