1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Luba_88 [7]
2 years ago
7

Im stuck on thiss for the longesttt

Computers and Technology
1 answer:
fiasKO [112]2 years ago
3 0

Answer:

i cant understand?,

Explanation:

i know its a sort of coding game but what is the goal of the game/task?

You might be interested in
Which term refers to a type of an attack in which an attacker makes his data look like it is coming from a different source addr
Andrew [12]

<u>Man-in-the-middle attack</u> refers to a type of an attack in which an attacker makes his data look like it is coming from a different source address, and is able to intercept information transferred between two computers.

<u>Explanation:</u>

A man-in-the-middle attack (MITM) is an assault where the aggressor furtively transfers and potentially changes the correspondences between two gatherings who accept that they are straightforwardly speaking with one another. This happens when the assailant catches a segment of a correspondence between two gatherings and retransmits it sometime in the future. The assailant would then be able to screen and perhaps change the substance of messages. The utilization of such encoded burrows makes extra secure layers when you get to your organization's secret systems over connections like Wi-Fi.

8 0
3 years ago
Discuss what repetitions structures are, and how they differ from the vectorization approaches we have previously studied in the
gogolik [260]

Repetition structures, or loops, are used when a program needs to repeatedly process one or more instructions until some condition is met, at which time the loop ends. Many programming tasks are repetitive, having little variation from one item to the next. Vectorized mathematical code appears more like the mathematical expressions found in textbooks, making the code easier to understand. That is the difference. Hope I could help you on Brainly.com!

6 0
4 years ago
Please find one organization that has recently adopted virtualization and summarize their reasons for taking this approach. What
Mamont248 [21]

Answer:

Harley-Davidson Motor Company

Explanation:

Harley-Davidson produces and sells custom-made, touring as well as cruiser motorcycles that feature elegant styling,  modern innovative design, and high quality performance with the ability to customize to ones taste.  Harley-Davidson moved 95% of their x86 server workloads to virtualized environments utilizing VMware infrastructures as of 2018. They report to have being able to have higher system availability, effective and simple disaster recovery capabilities, improved operation efficiencies, and cloud-ready infrastructure. One of the major challenges of virtualization is Security, Virtual systems can easily get compromised.

8 0
3 years ago
Your agile team only has one database developer. So the other developers finish their tasks and then wait for their work to be I
Novosadov [1.4K]

Members of an Agile development team often agrees on what tasks to work on and they do it together. The one possible solution to this challenge is to Have the database developer train the rest of the team so there are fewer handoffs.

Agile development team often works together as a team. They as team discuss the task yo take, when it will take place etc.

This team is all about communication, teamwork, problem-solving etc.

Conclusively, A task should be completed by one member on the team, but the team may choose to pair up when doing the work.

Learn more from

brainly.com/question/24383225

See full question below:

Your agile team only has one person who knows how to develop database software. So the other developers finish their tasks and then wait for their work to be Integrated into the database. This creates a pile of backed up work for the database developer. But it also means that the other developers must either wait or add to the growing pile of database work. What's one possible solution to this challenge?

Select an answer:

Have the database developer train the rest of the team so there are fewer handoffs.

Have the software developers split their time between other teams so they're not as productive

Encourage the database developer to work overtime to catch up with their work.

Create a large batch of work so the database developer can focus on finishing

8 0
3 years ago
50 POINTS!!!
ycow [4]

Answer:

1. -> B.

2. -> C

3. -> A

Explanation:

1. Antennas = help the router fetch and transmit a signal

2. Repeaters = help in increasing the range of signal

3. Adapters = help the device detect a wireless signal

7 0
3 years ago
Other questions:
  • Which of the following decimal (base-10) values is equivalent to the binary (base-2) value 101001?
    15·1 answer
  • Sometimes we write similar letters to different people. For example, you might write to your parents to tell them about your cla
    9·1 answer
  • 15. The text of a desktop publishing document is often created using
    6·2 answers
  • 1. Which plot element is typically the turning point and the most intense moment of a story? (1 point)
    11·2 answers
  • Type the correct answer in the box. Spell all words correctly.
    12·1 answer
  • True / False<br> The exponent in floating point is stored as a biased value.
    9·1 answer
  • How many bytes are there in 256 Kbytes?
    6·1 answer
  • You're working in a table that has three columns and five rows. Since the first row will be a header row, you want it to span al
    6·1 answer
  • Free points,
    15·2 answers
  • I will have to goste yall im busting my butt off doing homework
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!