1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oliga [24]
2 years ago
6

Why are all the expert and tutor verified answers wrong???

Computers and Technology
2 answers:
lubasha [3.4K]2 years ago
5 0

Answer:

this tends to happen a lot to me also I think that sometimes they dont know what their doing half the time. Maybe they just do it for money because they get payed a lot to answer questions. They make over 70,000 dollars a year i think.

Explanation:

posledela2 years ago
3 0
They’re right, most of the time the question you ask can confuse them or you may say it incorrect etc.
You might be interested in
During an investigation of a cybercrime, the law enforcement officers came across a computer that had the hard drive encrypted.
borishaifa [10]

Answer:

b. Try to convince the owner of the computer to give you to decryption key/password.

Explanation:

Encrypted hard drives have maximum security and high data protection. to access them you need to enter a password to unlock them.

The image filtering technique is a method that serves to selectively highlight information contained in an image, for which it does not work.

The encryption algorithm is a component used for the security of electronic data transport, not to access data on an encrypted hard drive.

The encryption key is used in encryption algorithms to transform a message and cannot be exposed by disconnecting the hard drive from its power source.

4 0
3 years ago
What is the most common option for fighting radiation?
tigry1 [53]
Lead Sheets, Plates, Slabs, & Foils.

Lead Shot
6 0
3 years ago
Discuss copyright issues as they relate to the Internet, including software piracy and digital rights management, and the Digita
LUCKY_DIMON [66]

To avoid privacy these copyright is been implemented. If copyright is not implemented software company such as Microsoft, Google cannot run the organization so that software has copyright and licenses and they protect from software privacy.

<u>Explanation:</u>

Since the world is digital world all software are available in internet for download and end user will not pay for software and use the software without purchasing from software development industries.

Even software are protected with key, hacker write the tool to brakes the key, so end user easily use these tools and generate the key and user it.

So that software company use Digital millennium copyright act, so that end user can arrested for missing the software’s.

5 0
3 years ago
Write a piece of code that constructs a jagged two-dimensional array of integers named jagged with five rows and an increasing n
Ksivusya [100]

Answer:

Explanation:

The following code is written in Java and it uses nested for loops to create the array elements and then the same for loops in order to print out the elements in a pyramid-like format as shown in the question. The output of the code can be seen in the attached image below.

class Brainly {

   public static void main(String[] args) {

       int jagged[][] = new int[5][];

       int element = 1;

       for(int i=0; i<5; i++){

           jagged[i] = new int[i+1]; // creating number of columns based on current value

           for(int x = 0; x < jagged[i].length; x++) {

               jagged[i][x] = element;

               element += 1;

           }

       }

       System.out.println("Jagged Array elements are: ");

       for ( int[] x : jagged) {

           for (int y : x) {

               System.out.print(y + " ");

           }

           System.out.println(' ');

       }

       }

   }

4 0
3 years ago
In Tynker it is not possible to create a/an______.
alina1380 [7]

Answer:

IDE

Explanation:

8 0
3 years ago
Other questions:
  • Create a stored procedure named prc_inv_amounts to update the INV_SUBTOTAL, INV_TAX, and INV_TOTAL. The procedure takes the invo
    8·1 answer
  • Suppose you find a magic $1.00 coin. Its magic power is as follows: as each day passes, you get an additional dollar plus half o
    6·1 answer
  • What kinds of online behaviors could be considered cyberbullying?
    7·2 answers
  • After the following code is executed what will be displayed on the screen? bool correntEmployee = true; double empSalary = 45000
    7·1 answer
  • What is the role of science and technology in achieving human’s ultimate goal or the good life?
    8·2 answers
  • What type of platform is Twitter?
    10·2 answers
  • Im drinking coffee. and working on school and watching a show. Whos with me?
    9·1 answer
  • ...............is a personal computer that fits on desk.​
    5·2 answers
  • ________ take advantage of vulnerabilities in software. Group of answer choices Blended threats Bots Trojan horses Direct-propag
    6·1 answer
  • Write the technical terms for the following statements: The repeated working capacity of computer.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!