1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dybincka [34]
2 years ago
15

Please Answer ASAP!!

Computers and Technology
1 answer:
Gwar [14]2 years ago
4 0

Answer:

I think it's true

Explanation:

Sorry if it's wrong :(

You might be interested in
Create a for-loop which simplifies the following code segment: penUp(); moveTo(100,120); turnTo(180); penDown(); moveForward(25)
kvasek [131]

Answer:

for(var i=0; i<3; i++) {

  penUp();

  moveTo(100,120);

  turnTo(180);

  penDown();

  moveForward(25);

}

Explanation:

The i variable is the loop dummy. The code block will be executed 3 times.

7 0
2 years ago
If the base address of an array is located at 0x1000FFF4, what would the following instructions be equivalent to (assume this ar
ZanzabumX [31]

Answer:

The correct option to the following question is my_array[2] = 45.

Explanation:

Because the offset '8' which used for the subscript 8 divided by 4 which is 2.

So, that's why my_array[2] = 45 is the correct answer to the following question.

An array is the data type in the programming languages which stores the same type of data at a time whether it an integer type or string type.

8 0
3 years ago
What other kinds of toolbars exist in addition to those that are part of individual programs?
Stells [14]
<span>A. toolbars that appear on the taskbar

</span><span>D. the process of allocating uses and resources for a server</span>
6 0
3 years ago
Confidential corporate data was recently stolen by an attacker who exploited data transport protections.Which of the following v
IgorC [24]

Answer:

c. improper input handling on the FTP site

Explanation:

Improper input handling on the FTP site is associated with encrypting and/or decrypting of input data. It has been observed that input handling on the FTP site is one of the leading causes of vulnerabilities found in contemporary's systems and applications, this is a result of application trusting which helps to establish restrictions and prevent Improper Input Handling attacks accurately.

Hence, in this case, the correct answer is "improper input handling on the FTP site"

5 0
2 years ago
Alice just wrote a new app using Python. She tested her code and noticed some of her lines of code are out of order. Which princ
kaheart [24]

Answer:

Sequencing

Explanation:

I have taken the test

5 0
3 years ago
Other questions:
  • Your friend wants to know about Microsoft Expression Web 4.
    5·1 answer
  • Indicate the proper order (1-4) of the following PR strategic planning 4-step process. 1 Defining the problem 2 Evaluating the p
    10·1 answer
  • How is the EF​ computed? A. ES​ + Activity time B. LF minusActivity time C. ​Min{LS of all immediate following​ activities} D. ​
    11·1 answer
  • What is the top folder of the file tree called
    5·2 answers
  • As an improvement of the ATX form factor over AT, shorter wires made it easier to shield them and made them capable of handling
    6·1 answer
  • How would improving the nutritional health of an entire community impact the overall physical, emotional, and financial health o
    14·1 answer
  • As an experienced networking professional, you are asked to conduct a posture assessment on a local credit union’s network. The
    12·1 answer
  • Which type of network involves buildings in multiple cities connecting to each other?
    8·1 answer
  • Also have a good day people !!
    5·2 answers
  • This unintelligent brain of mine decided to charge my phone overnight thinking that nothing bad will happen ;-; the next morning
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!