1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zvonat [6]
2 years ago
6

ANs and WANs can be set up in several different shapes, also known as peripherals.

Computers and Technology
1 answer:
nika2105 [10]2 years ago
8 0

Answer:

The Answer Is False Because They Aren't Called Peripherals

You might be interested in
9.10: Reverse ArrayWrite a function that accepts an int array and the array ’s size as arguments . The function should create a
AleksandrR [38]

Answer:

#include <iostream>

using namespace std;

int * reverse(int a[],int n)//function to reverse the array.

{

   int i;

   for(i=0;i<n/2;i++)

   {

       int temp=a[i];

       a[i]=a[n-i-1];

       a[n-i-1]=temp;

   }

   return a;//return pointer to the array.

}

int main() {

   int array[50],* arr,N;//declaring three variables.

   cin>>N;//taking input of size..

   if(N>50||N<0)//if size greater than 50 or less than 0 then terminating the program..

   return 0;

   for(int i=0;i<N;i++)

   {

       cin>>array[i];//prompting array elements..

   }

   arr=reverse(array,N);//function call.

   for(int i=0;i<N;i++)

   cout<<arr[i]<<endl;//printing reversed array..

   cout<<endl;

return 0;

}

Output:-

5

4 5 6 7 8

8

7

6

5

4

Explanation:

I have created a function reverse which reverses the array and returns pointer to an array.I have also considered edge cases where the function terminates if the value of the N(size) is greater than 50 or less than 0.

8 0
3 years ago
A non technical kind of cyber intrusion that relies heavily on human interaction and often involve tricking people into breaking
lana66690 [7]
Social Engineering.

---------------------------
4 0
3 years ago
2 examples of free, proprietary and online software for multimedia presentations (two of each) ._.
photoshop1234 [79]

Answer:

1. PowerPoint online

2. Goógle Slides

Explanation:

There is a various free, proprietary, and online software for multimedia presentations available for use. Some of which include:

1. PowerPoint online: this is an online and free version of Microsoft Office PowerPoint software. Some of its features include text formatting, use of animations, cloud storage among others.

2. Goógle Slides: This is a product of Goógle to make the multimedia presentation of documents available online. It also offers many feature including cloud storage.

4 0
2 years ago
What should you do when an error message pops up on the screen?
gladu [14]
D.) Write down the error message and research the cause based on the message.
5 0
3 years ago
Read 2 more answers
Which component of the computer keeps the operating system when the computer is running​
Brums [2.3K]

The CPU performs the instructions and writes the data back into your computer's random access memory or RAM. RAM temporarily stores data while your computer is running.

4 0
3 years ago
Other questions:
  • ________ is a method for addressing, creating, updating, or querying relational databases.
    9·1 answer
  • Google, Yahoo, and Microsoft search all use the same Web crawler.
    13·2 answers
  • You need to immediately terminate process id 2129. which command should you use?
    15·1 answer
  • On a network, which protocol is responsible for dividing files into chunks, adding headers containing information for reassembli
    10·1 answer
  • With the range E2:E30 selected, create a new conditional formatting rule that uses a formula to apply yellow fill and bold font
    10·1 answer
  • What values can represent a bit
    8·1 answer
  • You are asked to write a program that prompts the user for the size of two integer arrays, user input for the size must not exce
    13·1 answer
  • The director of security at an organization has begun reviewing vulnerability scanner results and notices a wide range of vulner
    11·1 answer
  • Which of the following statements is TRUE of a peer-to-peer network?
    10·1 answer
  • Computers rarely make mistakes. True or false
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!