1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
laila [671]
2 years ago
14

Q) Look at the code and determine the output

Computers and Technology
1 answer:
lutik1710 [3]2 years ago
6 0

Answer:

B.

Explanation:

You might be interested in
Does Rational database software lets you link multiple tables? Yes or no
Julli [10]

Answer:

yes

Explanation:

i did some research but don't take my word for it and let me know if it wrong

4 0
2 years ago
write a function that returns a list, where each member of list contains previous day’s value multiplied by 2.​
sergeinik [125]

Answer:

Explanation:

The following code is written in Java, the function takes in a list with the previous day's values. The function then uses that list, loops through it and multiplies each individual value by 2 and returns the modified list. The first red  square represents the test case for the function, while the second red square in the image represents the output.

 public static ArrayList<Integer> doubleIt(ArrayList<Integer> mylist) {

       for (int x = 0; x<mylist.size(); x++) {

           mylist.set(x, mylist.get(x)*2);

       }

       return mylist;

   }

5 0
3 years ago
A(n) _________ is any system resource that is placed onto a functional system but has no normal use for that system. If it attra
Kisachek [45]

Answer:

Honeytoken

Explanation:

Honeytokens (aka honey traps or honeypots) may be described as bogus or dummy IT resources which are created or placed in a system or network for the sole purpose of attracting the attention of cyber-criminals and being attacked. These might be servers, applications, complete systems or datasets which are placed online (via the public internet, or a public-facing gateway to a private network), in order to attract cyber-attackers.

Honeytokens may be specifically defined as pieces of data which on the surface look attractive to potential attackers, but actually have no real value – at least, not to the attacker. For the owners of the tokens (i.e. the people who set the trap), they can be of great value, as they contain digital information which is monitored as an indicator of tampering or digital theft.

8 0
3 years ago
Computer security is the use of ____ security techniques to protect data stored on computers.a. physicalb. portc. ​logicald. ​en
Arte-miy333 [17]

Answer:

anti virus

Explanation:

3 0
4 years ago
What kind of device does a computer need to provide information to a person or something else?
yanalaym [24]
An input device is something that gives information to the computer. On the other hand, an output device is something that gives you information.
7 0
4 years ago
Read 2 more answers
Other questions:
  • What decimal number does the bit pattern 0×0c000000 represent if it is a two's complement integer?
    5·1 answer
  • when applying styles to a document, which features of the style can be modified in the themes grouping?
    9·2 answers
  • The following parts were ordered by someone building a personal computer:
    12·1 answer
  • What is an example of the most important role of a systems analyst in any corporation?
    10·1 answer
  • _is a computer network created for an individual person
    10·1 answer
  • The Mifflin Cable store in Buffalo is currently offering a fabulous marketing strategy for potential new cable and Internet cust
    12·1 answer
  • 1. What does a network allow computers to share?
    13·1 answer
  • 18
    6·1 answer
  • Which validation method would you use for first name on a data form
    15·1 answer
  • If you want to design computing components for cars and medical
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!