1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zigmanuir [339]
2 years ago
11

Complete the following sentence by choosing the best answer from the options listed below.

Computers and Technology
2 answers:
Fynjy0 [20]2 years ago
6 0

Answer:

Physical components

Explanation:

hope it helps

Vitek1552 [10]2 years ago
6 0

Answer:

its physical components

i looked up a quizlet just to answer and thats what it said :)

Explanation:

You might be interested in
Write a multi-threaded program that outputs prime numbers. The program should work as follows: the user will run the program and
Ierofanga [76]

Answer:

The programming code can be found in the explanation part, please go through it.

Explanation:

Code:

#include<stdio.h>

#include<stdlib.h>

#include <pthread.h>

// function check whether a number

// is prime or not

int isPrime(int n)

{

// Corner case

if (n <= 1)

return 0;

// Check from 2 to n-1

for (int i = 2; i < n; i++)

if (n % i == 0)

return 0;

return 1;

}

void* printPrimes(void *vargp)

{

int *n = (int *)vargp;

int i=0;

for (i=2;i<=n;i++)

{

if (isPrime(i)) printf("%d\n", i);

}

}

// Driver Program

int main(int argc, char* argv[])

{

int n = atoi(argv[1]);

pthread_t tid;

pthread_create(&tid, NULL, printPrimes, (void *)n);

pthread_exit(NULL);

return 0;

}

4 0
3 years ago
True or false? risk assessment should cover personnel, as well as technical support such as firewalls, secure operating systems
TEA [102]
Risk assessment should cover all the processes and systems included in an organization. This means this includes also the technical support including <span>firewalls, secure operating systems and networks, and antivirus protection. Risk is always present and inevitable in every way so it is important to anticipate and make early detections to counter with actions as soon as one can.</span>
5 0
3 years ago
(5 pts) Write the type declaration for a struct DataType named Appointment containing the following members: - a string variable
7nadin3 [17]

Answer:

  1. struct Appointment {
  2.    char name[20];
  3.    struct Date d;
  4.    struct Time t;
  5. };
  6. struct Date{
  7.    int year;
  8.    int month;
  9.    int day;
  10. };
  11. struct Time{
  12.    int hour;
  13.    int minutes;
  14.    int seconds;
  15. };

Explanation:

To create a struct data type, let use the keyword "struct" and followed with the variable name, <em>Appointment </em>(Line 1).  

Next create the string member, <em>name</em> (Line 2).

Next we need to  include two other struct data types (Date and Time) as part of the member of the existing struct. To do so, we can try to define the struct for Date (Line 8 - 12) and Time (Line 14 - 18) separately.

At last, we include the struct<em> Date</em> & <em>Time</em> into the <em>Appointment </em>struct (Line 3-4)

5 0
3 years ago
Convert Octal 623, to Decimal number ​
Levart [38]

Answer:

403_{10}

<em>Hope you got it </em>

<em>If you have  any question just ask me</em>

<em>If you think this is the best answer please mark me as brainliest</em>

8 0
3 years ago
PowerPoint _____ should reinforce the speaker’s message and help the audience retain the information presented.
maw [93]
Powerpoint presentations should reinforce the speaker's message...
4 0
3 years ago
Other questions:
  • The _______ number system allows digital devices to represent virtually any number simply by using 0s and 1s.â
    14·1 answer
  • Write a program that will calculate the following function:
    14·1 answer
  • is a specific system for gathering information from a single group of respondents by continuously monitoring the advertising, pr
    13·1 answer
  • What is data protection
    13·1 answer
  • vulnerability is a feebleness which allows an attacker to condense a system's information assurance to security,is it true or fa
    14·1 answer
  • In this problem, we explore some of the properties of the CRC. For the generator G (=1001) given in Section 5.2.3, answer the fo
    14·1 answer
  • "What technology will examine the current state of a network device before allowing it can to connect to the network and force a
    13·1 answer
  • Implement a function called merge that does the following in C#:
    7·1 answer
  • Please help im not good at computer class ​
    10·2 answers
  • Insert XXX to output the student's ID. public class Student { private double myGPA; private int myID; public getID) { return myI
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!