1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Serhud [2]
3 years ago
6

Aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa

Computers and Technology
1 answer:
FrozenT [24]3 years ago
4 0

Answer:

this is a great day to all of you

You might be interested in
Which of the following is not a valid variable name? 2 myInt 2. return 3. myInteger 4. total3
Reptile [31]

Answer:

Correct answer is option (2) that is "return".

Explanation:

In any programming language, a variable name can be made up of letters (lower and upper case) and digits. we can also use "_" underscore character for declaring the variables but we cannot use any special character like “$”.We cannot use digits in the beginning of variables name. And we also cannot use reserved keywords of the language like "new","return","while" etc. There should not be space between the variable names. Options 1, 3 and 4 are not violating any of these properties. But in option (2), "return" is a reserved keyword. That is why it is not a valid variable name.

Some example of valid variables name:

foo

BAZ

Bar

_foo42

foo_bar

Some example of invalid variables name:

$foo    ($ not allowed)

while   ( keywords )

2foo    (started with digit)

my foo  (spaces )

5 0
4 years ago
Consider a multidimensional array A stored in row-major order with 22 rows and 6 columns whose subscripts start at 0. If each el
siniylev [52]

Answer:

Option c is the correct answer for the above question.

Explanation:

  • If the array will store in row-major order, then it will be a store like the first row, then second row and then third row.
  • If the user wants to conclude the address of the A[3,5], then the address of the A[3,5] will be 184.
  • It is because the 3 states the row number and the 5 states the column number.
  • The above question states that every value take 8 bit. and there are 4 rows from 0 to 3 and 6 column (0 to 5) for every row (except the fourth rows because it takes 5 columns from 0 to 4) before the A[3,5].
  • So there are 23 value before A[3,5] which are as-- [00,01,02,03,04,05][10,11,12,13,14,15][20,21,22,23,24,25][30,31,32,33,34].
  • So when every value takes 8 bit then 23 value takes 184 bits(23*8).
  • So the address of A[3,4] is 184.
  • Hence option c is the correct and the other is not because of 184 stated from the c option only.
4 0
3 years ago
Factor f(x)=x^3-6x^2+9x
liq [111]
Since all terms have an x in them, you can first factor that out, yielding:

f(x) = x(x² - 6x + 9)

Then you are looking for numbers that multiplied give 9 and added give -6, which is -3 and -3. So the final factorization is:

f(x) = x(x-3)²

6 0
3 years ago
On the Visit screen, you will not see one of the following:
san4es73 [151]

Answer:

The answer is "Option b".

Explanation:

An access level denotes a set of data type permissions or restrictions, that reduces the access level, which is an effective way to reduce failure modes, debug time and system complexity. and other options are not correct, i.e. define as follows:

  • In option a, In some of the cases, the system provides security, which is responded by the server to check the Eligibility of user, that's why it is not correct.
  • In option c, The home address is always shown on the URL, that's why it is not correct.

8 0
4 years ago
A device receives a data link frame with data and processes and removes the Ethernet information. What information would be the
il63 [147K]

The information that would be the next to be processed by the receiving device is: IP at the internet layer.

<h3>Internet protocol (IP)</h3>

Internet protocol is a network protocol that help to transmit data to user device across the internet or network which inturn make it possible for user device to connect and communicate over the network.

Internet protocol at the internet layer is a TCP/IP software protocol which sole purpose is to transfer data packets across the internet after receiving and processing the data.

Inconclusion the information that would be the next to be processed by the receiving device is: IP at the internet layer.

Learn more about internet protocol here:brainly.com/question/17820678

7 0
2 years ago
Other questions:
  • There was a thunderstorm in your area and the power went out.
    12·1 answer
  • The computer has had far-reaching effects on our lives.how has the computer effected your life?
    8·1 answer
  • ___________ is the term used to describe the time taken from when a packet is sent to when the packet arrives at the destination
    11·1 answer
  • How is “compromise" defined in the context of information technology and Select one answer.
    5·2 answers
  • Juan created new video game for his coding course. What is one way he can explain his code in everyday language?
    7·1 answer
  • Match the parts of the software applications with what they do.
    15·1 answer
  • Suppose end system A wants to send a large file to end system B. At a very high level, describe how end system A creates packets
    9·1 answer
  • Software that is decided to intentionally causing harm to a device, server, or network is 
    13·2 answers
  • Help fast pleas. 3. How is this text formatted? (1 point)
    14·1 answer
  • Create a statement that always returns the names of the three criminals with the highest number of crimes committed.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!