1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elena-s [515]
2 years ago
10

Unit 2: Lesson 6 - Coding Activity 1

Computers and Technology
1 answer:
gogolik [260]2 years ago
4 0

Answer:

easyy

Explanation:10 smaple runs and 2

You might be interested in
Which type of programmer designs programs for applications executed on the internet?
lisabon 2012 [21]
Wait. What? What does that even mean?
8 0
3 years ago
from january 2005 through july 2015, approximately how many electronic data records in the United States were breached, exposing
Brums [2.3K]
From January 2005 through July 2017, approximately 853 million electronic data records in the US were breached.
This allowed the attackers to take control over people's personal data, such as their various credit card numbers, and other important data, as well as their addresses, etc. The cyber police, as well as the regular police have been working hard to stop this from happening, but the hackers are very strong and smart.
4 0
3 years ago
A _____ is an electronic path over which data can travel.
vazorg [7]
A bus is an electrical path which data travels between the different components in an electronic device.                                                                      
5 0
3 years ago
Which statement best describes the difference between a spreadsheet and a database?
Dmitrij [34]

Answer:

Databases store data in tables that interact; spreadsheets store data in cells that interact.

Explanation:

3 0
2 years ago
Read 2 more answers
Taylor volunteered as a computer support specialist for his university's online library. Which part of his resume should include
Sophie [7]
 it would be experience 
<span />
8 0
3 years ago
Read 2 more answers
Other questions:
  • A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The c
    14·1 answer
  • What are 2 ways that technology can negatively impact the environment.
    8·2 answers
  • What is an example of how pseudo - randomness is used to creative variation​
    5·1 answer
  • How many times would the following loop iterate?
    15·1 answer
  • Which magazine introduced the first microcomputer kit for the mits altair in its january 1975 issue?
    8·1 answer
  • What do you need for digital photography? 1. 2. 3.
    13·1 answer
  • What do I do if my friend wants me to watch a video at my house?
    8·2 answers
  • What happen if there is no authentication??
    10·2 answers
  • 1 point
    5·2 answers
  • Please answer this question​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!