1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
salantis [7]
3 years ago
15

Pls help help i will give brainliest help pls​

Computers and Technology
1 answer:
Veronika [31]3 years ago
8 0

Answer:

3 or 2

Explanation:

You might be interested in
Which code segment results in "true" being returned if a number is even? Replace "MISSING CONDITION" with the correct code segme
Elden [556K]

Answer:

The answer is "Choice A".

Explanation:

In this code, a method "isEven" is declared that accepts the "num" variable in its parameter, and inside the method and if block is declared that checks the even number condition if it is true it will return a value that is "true" otherwise it will go to else block that will return "false" value, that's why other choices are wrong.

8 0
3 years ago
As a chemical engineer, what would you be most likely to do in your job?
stealth61 [152]

Answer:

The correct option is;

Design sewer treatment plants

Explanation:

Chemical engineers, also known as a process engineer, are involved in the design and development of cost beneficial ways of utilizing energy and materials which can mostly be established as a chemical manufacturing process

The chemical engineer works by applying scientific principles to resolve and provide amicable solutions to the production usage, disposal, and waste management, of chemical and other related materials

Chemical engineers conducts research into the usage of materials and production process.

6 0
3 years ago
If userA wants to send a secure message to userB using an asymmetric cryptographic algorithm, which key does userB use to decryp
ANTONII [103]

Answer:

userB will use his/her private key.

Explanation:

The steps involved in using asymmetric cryptographic algorithm are as follow:

1. Each user generates a pair of keys to be used for the encryption and decryption of messages.

2. Each user places one of the two keys in a public register or other accessible file. This is the public key. The companion key is kept private.

3. If UserA wishes to send a confidential message to UserB, UserA encrypts the message using UserB's public key.

4. When UserB receives the message, she decrypts it using her private key.

4 0
4 years ago
Why do primitive types have ranges of values? what determines the range of the data type?
Alexxx [7]
What determines the range of primitive data types is a combination of the number of bytes that is allocated to them and if there's any encoding.

Not too long ago, it was normal for an integer to receive four bytes of memory. An unsigned integer would also receive four bytes of memory. The unsigned int  had a range of 0 - (2^32 - 1) because it could only be used for positive integers and could use all 32 bits. An integer has a range of (- 2^31 through +2^31 - 1). The 32nd bit is uses as a sign bit (0 for positive, 1 for negative).

Just for thoroughness: when an int is negative, it's stored as the two's complement of it's absolute value.
5 0
3 years ago
12. Why is it so important to pay attention to your digital reputation?
natita [175]

Answer:

B.) It can seriously affect your future career and educational goals.

I hope this helps! ^-^

3 0
3 years ago
Other questions:
  • This is not a removable media device
    15·1 answer
  •                                                        HELP PLEASE 
    12·2 answers
  • What term is used to describe the harassment of computer users through various forms of internet communications?
    5·1 answer
  • Whats your favorite sport between these options?
    12·2 answers
  • If a simple pipelined processor is super-pipelined by a factor of 3 (the ALU takes 3 cycles instead of one for the smallest oper
    15·1 answer
  • What manages and control the speed of a motherboards buses
    5·1 answer
  • Had you guys go to prom by yourself or someone in your senior class
    5·2 answers
  • Can someone please explain this issue to me..?
    12·2 answers
  • The following Mic1 microcode excerpt shows support for a possible 7 bit opcode, 8 bit integer argument machine instruction (orga
    14·1 answer
  • How to make a computer
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!