1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Naddik [55]
2 years ago
7

12 POINTS!!!!

Computers and Technology
1 answer:
Klio2033 [76]2 years ago
7 0

Answer:

1) daily

2)37%

Explanation:

1) regularly implies it

You might be interested in
Write a public static method diagSum, which takes a 2d array of int values as a parameter, and returns the sum of the elements i
saveliy_v [14]

A 2d array (i.e. 2 dimensional array) represents its elements in rows and columns

<h3>The program in Java</h3>

The method in Java, where comments are used to explain each line is as follows

//This defines the method

public static int diagSum(int[][] myArray) {

    //This initializes sum to 0

    int sum = 0;

    //This iterates through each row of the array

               for (int i = 0; i < myArray.length; i++) {

                   //This calculates the sum of the diagonals

                       sum+=myArray[i][i];

               }

               //This returns the sum

               return sum;

       }

Read more about methods at:

brainly.com/question/15969952

6 0
2 years ago
Previous
KonstantinChe [14]

Answer: Internet service provider

Explanation:

5 0
3 years ago
A network administrator manages a network with 75 servers. At least twenty of those servers are approaching end of life but the
Gekata [30.6K]

Answer:

Virtual servers

Explanation:

4 0
3 years ago
When a computer is the.................of an attack, it is used as an active tool to conduct the attack
BARSIC [14]

Answer:

Attack is an intentional or unintentional act that causes damage or compromises information of systems supporting it.When a computer is the subject of an attack, it is used as an active tool to conduct the attack.

On the other hand, when a computer is the entity being attacked, it is the object of an attack.

3 0
2 years ago
Which program is commonly used to verify a new piece of hardware?
NeX [460]
<span>In the current software market, the most commonly used desktop operating systems fall into three groups: Microsoft Windows, Apple Mac OS, and Linux. Before upgrading the operating system, check the minimum hardware requirements of the new OS to ensure that it can be installed successfully on the computer. </span>
6 0
3 years ago
Other questions:
  • Suppose alice, with a web-based e-mail account (such as hotmail or gmail), sends a message to bob, who accesses his mail from g
    10·1 answer
  • Which type of drawer has three dispensing modes: single-dose, multi-dose, and matrix?
    13·1 answer
  • Host A is sending Host B a large le over a TCP connection. Assume Host B has no data to send Host A. Host B will not send acknow
    14·1 answer
  • Your unit has an upcoming training event. What form is used to record and maintain document numbers for ammunition documents?
    5·1 answer
  • While the Internet can be a great resource, the information is not always reliable, as anyone can post information. Select one:
    11·1 answer
  • The _________ unit, within the CPU, interprets software instructions and literally tells the other hardware devices what to do,
    5·1 answer
  • What integer is represented by the following 8-bit twos complement representation: 1011 0000 ? (Enter your number in decimal, an
    6·1 answer
  • It is important to know the terms of use of any website because why
    12·2 answers
  • Why do many experts recommand longer time horizonal if you are doing high risk investment
    7·1 answer
  • Write a function called changeCharacter that takes three parameters – a character array, its size, and the replacement character
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!