1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Agata [3.3K]
3 years ago
14

What's wrong with SontungMTP's song?

Computers and Technology
2 answers:
Anettt [7]3 years ago
7 0

Answer:

A

Explanation:

Marina CMI [18]3 years ago
5 0

My guess is C

If u know y do u ask ? Lol

Btw have a nice day

You might be interested in
Question # 3
Contact [7]

Answer:

The answer is >

Explanation:

I did the assignment on edge this was the correct answer

5 0
3 years ago
Read 2 more answers
You will complete 3 tasks. Task 1: Determine if the input number is prime or not You will ask the user for an integer You will d
GuDViN [60]

Answer:

Program is written in C++

#include<iostream>

using namespace std;

int main()

{

//1. Prime Number

int num;

cout<<"Input Number: ";

cin>>num;

int chk = 0;

for(int i =2; i <num;i++)

{

 if(num%i==0)

 {

  chk = 1;

  break;

 }

}

if(chk == 0)

{

 cout<<num<<" is prime"<<endl;

}

else

{

 cout<<num<<" is not prime"<<endl;

}

//2. Greatest Common Factor

int num1, num2, x, y, temp, gcf;  

cout<<"Enter two numbers: ";

cin>>num1;

cin>>num2;

x = num1;

y = num2;

while (y != 0) {

   temp = y;

   y = x % y;

   x = temp;

 }

 gcf = x;

 cout<<"Greatest Common Factor: "<<gcf<<endl;

 

// 3. LCM  

cout<<"Enter two numbers: ";

cin>>num1;

cin>>num2;

x = num1;

y = num2;

while (y != 0) {

   temp = y;

   y = x % y;

   x = temp;

 }

 gcf = x;

 int lcm =(num1 * num2)/gcf;

cout<<"Least Common Multiple: "<<lcm<<endl;

return 0;

}

Explanation:

<em>I've added the full source code as an attachment where I make use of comments to explain some lines</em>

Download cpp
6 0
3 years ago
Cryptography has requirements include:
ki77a [65]

Answer:

A

Explanation:

Cryptography is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents. ... When transmitting electronic data, the most common use of cryptography is to encrypt and decrypt email and other plain-text messages.

4 0
3 years ago
In cell D5, enter a formula to calculate the number of days for the first workshop. Add 1 to the results to include the total nu
iris [78.8K]

Answer:

D7

Explanation:

5 0
4 years ago
A rootkit uses a directed broadcast to create a flood of network traffic for the victim computer.a. Trueb. False
Lady_Fox [76]

Answer:

The following statement is False.

Explanation:

The following statement is not true because the rootkit is an application that provides unauthorized access to the computer or any program and it is the software that is intended to harm the computer system. So, that's why the rootkit is not used to create a flood of the network traffic in the user's system.

6 0
3 years ago
Other questions:
  • What are the four main types of section breaks? Check all that apply.
    9·2 answers
  • Needed urgently what are short cut keys
    8·2 answers
  • How do i add a header or footer to powerpoint presentation
    15·1 answer
  • Consider a Games Expo for Children. Six competitions are laid out for the expo. Tickets are sold according to the age and gender
    11·1 answer
  • Which is a basic job requirement for a career in corrections services?
    13·1 answer
  • What is SoC? how is it different from CPU?
    14·1 answer
  • What does a converter do? A. It converts one technological system into another. B. It converts one type of electrical signal int
    10·2 answers
  • What is software? what are two types of software?​
    6·1 answer
  • I need this ASAP!
    9·2 answers
  • If you are going to develop a special computer, what would it be and explain it's purpose.​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!