1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Illusion [34]
3 years ago
11

Need help completing this coding assignment.

Computers and Technology
1 answer:
Anni [7]3 years ago
4 0

Answer:

akuma matata ak

Explanation:

You might be interested in
How many of the colonists of Jamestown died before they made it to shore, due to the difficult voyage?
erma4kov [3.2K]
Almost all of the colonist of Jamestown died before they made it to shore, due to the difficult voyage.
8 0
3 years ago
1. Which of the following is not true about high-level programming language s? (a) Easy to read and write (b) Popular among prog
vazorg [7]

Answer:

1: c

2: c

Explanation:

The higher-level the language, the more it resembles human language.

In Python, the print() statement outputs text.

6 0
3 years ago
A network technician is assisting the security team with some traffic captures. The security team wants to capture all traffic o
Katyanochek1 [597]

Answer:

Option C i.e., Hub.

Explanation:

When network technician helps the support team with processing a few of the data. The support team needs to occupy both congestion between the router and the core switch over an individual subnet. To use it, the members must make sure there's only an individual collision as well as they broadcast IP address between both the router and the switch through which the congestion is received.

So, the technician installs the Hub to meet the following goal because It captures all the traffic on an individual subnet between them.

4 0
3 years ago
Why is time management considered a soft skill
FinnZ [79.3K]
This is due to the simple fact that time management helps you not only get things done for yourself, but also not get in the way of others and let them get things done for themselves. It's like working in harmony.

Hope this helps! <3
5 0
3 years ago
Read 2 more answers
____ is any technology that aids in gathering information about a person or organization without their knowledge.
DanielleElmas [232]

Answer:

Spyware

Explanation:

In most cases, a spywares are unwanted software enters into your computer or other devices and steal sensitive information, your internet usage data, and other information. Spyware is considered a malware type and a malicious one that is aimed at damaging a device or gaining control and access without the knowledge of the owner.

4 0
3 years ago
Other questions:
  • What is the difference between a learner’s license and an operator’s license?
    13·1 answer
  • Write an essay on online collaboration, how to do it, the challenges, resolving the challenges, and consider whether the risks a
    12·1 answer
  • In the Remote Access Domain, if private data or confidential data is compromised remotely, you should set automatic blocking for
    5·1 answer
  • Was the big blue button thing a good decision or bad?<br> *I think it was a bad idea.
    15·2 answers
  • Which of the following is the MOST sensitive Personally Identifiable Information (PII) and should be shared cautiously and only
    8·1 answer
  • package dataStructures; /** * Class OrderedLinkedList. * * This class functions as a linked list, but ensures items are stored i
    8·1 answer
  • ---------------is a systematic review of a person’swork and achievements over a recent period, usually leading toplans for the f
    11·1 answer
  • How does computer number system play a Vital role in a computer calculation. ​
    8·1 answer
  • How would you assign roles to your group members?
    9·2 answers
  • Write a function magicCheck that takes a one-dimensional array of size 16, a two-dimensional array of four rows and four columns
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!