1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elena-s [515]
3 years ago
10

Unit 2: Lesson 6 - Coding Activity 1

Computers and Technology
1 answer:
gogolik [260]3 years ago
4 0

Answer:

easyy

Explanation:10 smaple runs and 2

You might be interested in
Without using any additional variables, and without changing the values of ndays or the elements of the parkingTickets array, wr
dusya [7]

Answer:

Explanation:

mostTickets=0;

for (k=0; k< ndays; k++){

if (parkingTickets[k]>mostTickets) mostTickets=parkingTickets[k];

}

7 0
3 years ago
_____ includes a wide range of applications, practices, and technologies for the extraction, transformation, integration, analys
Alla [95]

Answer:

The answer is "Option a".

Explanation:

The B.I. is a method, methodology, software, and development set that makes raw data usable and relevant, which facilitates improved decision-making and competitive opportunities, and certain choices were wrong, which can be described as follows:

  • In option b, The A.I is uses in the machines, that's why it is not correct.
  • In option c, It is used to analyze the data, which used in business. that's why it is not correct.
  • In option d, It is wrong, because it a part of A.I.
6 0
3 years ago
Question 9. which describes an str?
Nadya [2.5K]
<span><span>STR stands for Short Term repeat. It is </span>a region of a DNA molecule that contains short segments of three to seven repeating base pairs</span>
<span>Hundreds of different types of STR's are found in the human genomes.</span>
3 0
3 years ago
Consider the following code:
Phoenix [80]

Answer:

customers += newCustomer;

Explanation:

The operator += expands into + and assignment. The assignment is not overloaded so the required code is

customers += newCustomer;

This expands into

customers = customers + newCustomer;

The overloaded + operator is called for the right expression. This returns a `CustomerList`, which is then assigned through the = operator to `customers`.

3 0
3 years ago
A computer has many resources. A resource can be memory, disk drive, network bandwidth, battery power, or a monitor. It can also
bekas [8.4K]

Answer:

The security principle being referred to here is:

Resource Encapsulation.

Explanation:

Resource Encapsulation is one of the cybersecurity first principles.  It allows access or manipulation of the class data as intended by the designer. The cybersecurity first principles are the basic or foundational propositions that define the qualities of a system that can contribute to cybersecurity.  Other cybersecurity first principles, which are applied during system design, include domain separation, process isolation, modularization, abstraction, least principle, layering, data hiding, simplicity, and minimization.

7 0
3 years ago
Other questions:
  • Ron is creating building blocks in Word. How can he make the building blocks that he created available?
    11·2 answers
  • Five computers are connected to a switch in a star topology. what type of network is this?
    12·1 answer
  • Which button, when pressed, allows light from the subject to fall on the sensor?
    8·1 answer
  • Given an array as follows
    11·1 answer
  • A solid understanding of __________ is the foundation of verbal communication
    7·1 answer
  • Give three reasons why you think Clip Art is so widely used in many different types of documents.
    13·2 answers
  • If a speaker repeats a point, it is likely _____.
    7·2 answers
  • Write a program that displays the middle value of three unduplicated input values. Hint: Review the four solutions in the smalle
    10·1 answer
  • Interstate highway numbers Primary U.S. interstate highways are numbered 1-99. Odd numbers (like the 5 of 95) go north/south, an
    8·1 answer
  • The principle of ________ strongly suggests that programs should execute with the least amount of privileges needed to complete
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!