Answer:
Explanation:
Ok, I don't understand anything at the end because it's utter gibberish.
What you can do, based on the question, is ask user input for the two x and two y coordinates, then use the distance formula. The distance is \(\sqrt{(x_1-x_2)^2+(y_1-y_2)^2} .\) Find a way to insert that using the math library.
Hope that helped,
-FruDe
Hiya people. I am a game developer and I need an idea for a new game. If you have any ideas, pls feel free to tell me. Best idea gets brainliest.
Answer:
A better RPG game all the one that are existing are the same dull thing
Explanation:
Answer:
There are many ideas you can get for games but now-a-days action games are getting more fame than others such as fortnite, freefire, pubg etc. I prefer you to make a game that is relatated to action or adventure. You can make it related to zombie hunting, or online fighting games, or some adventurous games like tomb raider.
public class ArrayCopy {
public static void main (String[] argv)
{
int[][] A = {
{1},
{2, 1},
{3, 2, 1},
{4, 3, 2, 1},
{5, 4, 3, 2, 1}
};
print (A);
int[][] B = copy (A);
print (B);
}
static void print (int[][] X)
{
for (int i=0; i
for (int j=0; j < X[i].length; j++) {
System.out.print (" " + X[i][j]);
}
System.out.println ();
}
}
// INSERT YOUR CODE HERE.
}
answer in java, please complete code above
Sure! Below is the completed code that includes the missing part:
java:
public class ArrayCopy {
public static void main(String[] argv) {
int[][] A = {
{1},
{2, 1},
{3, 2, 1},
{4, 3, 2, 1},
{5, 4, 3, 2, 1}
};
print(A);
int[][] B = copy(A);
print(B);
}
static void print(int[][] X) {
for (int i = 0; i < X.length; i++) {
for (int j = 0; j < X[i].length; j++) {
System.out.print(" " + X[i][j]);
}
System.out.println();
}
}
static int[][] copy(int[][] X) {
int[][] copyArray = new int[X.length][];
for (int i = 0; i < X.length; i++) {
copyArray[i] = new int[X[i].length];
for (int j = 0; j < X[i].length; j++) {
copyArray[i][j] = X[i][j];
}
}
return copyArray;
}
}
In the given code, the missing part is the `copy` method. This method is responsible for creating a copy of the 2D array `A` and returning it as a new 2D array.
The `copy` method initializes a new 2D array `copyArray` with the same number of rows as the original array `X`. It then iterates over each row of `X` and creates a new row in `copyArray` with the same length as the corresponding row in `X`. Finally, it copies the values from each element of `X` to the corresponding element in `copyArray`.
The completed code allows you to print the original array `A` and its copy `B` by calling the `print` method. The `print` method iterates over each element in the 2D array and prints its values row by row.
Note: When running the code, make sure to save it as "ArrayCopy.java" and execute the `main` method.
For more questions on copyArray, click on:
https://brainly.com/question/31453914
#SPJ8
In java Please
3.28 LAB: Name format
Many documents use a specific format for a person's name. Write a program whose input is:
firstName middleName lastName
and whose output is:
lastName, firstInitial.middleInitial.
Ex: If the input is:
Pat Silly Doe
the output is:
Doe, P.S.
If the input has the form:
firstName lastName
the output is:
lastName, firstInitial.
Ex: If the input is:
Julia Clark
the output is:
Clark, J.
Answer:
Explanation:
import java.util.Scanner;
public class NameFormat {
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
System.out.print("Enter a name: ");
String firstName = input.next();
String middleName = input.next();
String lastName = input.next();
if (middleName.equals("")) {
System.out.println(lastName + ", " + firstName.charAt(0) + ".");
} else {
System.out.println(lastName + ", " + firstName.charAt(0) + "." + middleName.charAt(0) + ".");
}
}
}
In this program, we use Scanner to read the input name consisting of the first name, middle name, and last name. Based on the presence or absence of the middle name, we format the output accordingly using if-else statements and string concatenation.
Make sure to save the program with the filename "NameFormat.java" and compile and run it using a Java compiler or IDE.
.
Where should you select to create a bibliography citation source?
A. At the end of the text you want to cite
B. At the top of the page
C. At the beginning of the text you want to cite
D. At the bottom of the page
Write a program to repeatedly read integers from the standard input until it reads "-1" and exits. For each number before "-1," if it is positive and odd, do the following:
Answer:
#include <stdio.h>
int main() {
int p=0, n=0, z=0, inp=0;
printf("How do I write a C program to read numbers until -1 "
"is encountered and also count the number of positive, negative, "
"zeroes encountered by users using a while loop?\n\n\n");
printf("Enter an integer (-1 to quit): ");
scanf("%d",&inp);
while(inp != -1) {
if(inp > 0) p++;
else if(inp < 0) n++;
else z++;
printf("\nEnter next integer (-1 to quit): ");
scanf("%d",&inp);
}
n++; /* -1 is also a -ve number */
printf("You have entered ...\n");
printf("\t\tPositive numbers: %d\n",p);
printf("\t\tNegative numbers: %d\n",n);
printf("\t\t Zeroes: %d\n",z);
}
Explanation:
How is the architecture converted into software code? Elaborate the steps its passes through with help of examples / Diagram.
Answer:
software code 89089999990
List the do's and don'ts of secure online interactions
Answer:
The answer is below
Explanation:
The "dos" are the safe practice's website users should always do to provide themselves a form of security against potential hackers in online interactions.
Hence, are the "dos" based on the options listed.
1. Use a long password with mixed characters
2. Use antivirus and spyware protection
3. Don't write your password down and leave it where others can find it
4. Go through the terms and conditions, and privacy policies of social networking and other websites that you access.
On the other hand, the "don'ts" are the practices a website user or visitor should avoid doing to provide themselves a form of security against potential hackers in online interactions.
Hence, are the "don'ts" based on the options listed.
1. Keep yourself logged in when you leave your computer
2. Share your password with your friends
3. Retain cookies every time you visit a website.
PLEASE HELP!
A primary school teacher wants a computer program to test the basic arithmetic skills of her students.
The program should generate a quiz consisting of a series of random questions, using in each case any two numbers and addition, subtraction and multiplication
The system should ask the student’s name, then ask 10 questions, output if the answer to each question is correct or not and produce a final score out of 10.
The program should save the scores to an external file and offer an option to view the high score table.
Analyse the requirements in detail and design, code, test and evaluate a program to meet these requirements.
The program that will execute as required above is:
import random
def generate_question():
num1 = random.randint(1, 10)
num2 = random.randint(1, 10)
operator = random.choice(['+', '-', '*'])
question = f"What is {num1} {operator} {num2}? "
if operator == '+':
answer = num1 + num2
elif operator == '-':
answer = num1 - num2
else:
answer = num1 * num2
return question, answer
def save_score(name, score):
with open('scores.txt', 'a') as file:
file.write(f"{name}: {score}/10\n")
def view_high_scores():
with open('scores.txt', 'r') as file:
scores = file.readlines()
scores.sort(reverse=True)
print("High Score Table:")
for score in scores:
print(score.strip())
def arithmetic_quiz():
name = input("Enter your name: ")
score = 0
for _ in range(10):
question, answer = generate_question()
user_answer = int(input(question))
if user_answer == answer:
print("Correct!")
score += 1
else:
print("Incorrect!")
print(f"Final score: {score}/10")
save_score(name, score)
option = input("Do you want to view the high score table? (y/n) ")
if option.lower() == 'y':
view_high_scores()
arithmetic_quiz()
What is the objective of the above program?The objective of the above program is to create a computer program that tests the basic arithmetic skills of primary school students.
The program generates a quiz with random arithmetic questions, allows users to answer them, provides feedback on the correctness of their answers, saves scores, and offers a high score table for viewing.
Learn more about program:
https://brainly.com/question/30613605
#SPJ1
What are the reasons for breaking up a long data transmission into a number of frames?
Answer:
Buffer size may be limited.
Create a class Car, which contains Three data members i.e. carName (of string type), ignition (of bool type), and currentSpeed (of integer type)
A no-argument constructor to initialize all data members with default values
A parameterized constructor to initialize all data members with user-defined values
Three setter functions to set values for all data members individually
Three getter function to get value of all data members individually
A member function setSpeed( ) // takes integer argument for setting speed
Derive a class named Convertible that contains
A data member top (of Boolean type)
A no-argument constructor to assign default value as “false” to top
A four argument constructor to assign values to all data-members i.e. carName, ignition, currentSpeed and top.
A setter to set the top data member up
A function named show() that displays all data member values of invoking object
Write a main() function that instantiates objects of Convertible class and test the functionality of all its member functions.
Answer:
Copy paste it.
Explanation:
#include <iostream>
#include <string>
using namespace std;
//Create a class Car, which contains • Three data members i.e. carName (of string type), ignition (of bool type), and //currentSpeed (of integer type)
class Car
{
public:
string carName;
bool ignition;
int currentSpeed;
//A no-argument constructor to initialize all data members with default values
//default value of string is "",bool is false,int is 0
Car()
{
carName="";
ignition=false;
currentSpeed=0;
}
//A parameterized constructor to initialize all data members with user-defined values
Car(string name,bool i,int speed)
{
carName=name;
ignition=i;
currentSpeed=speed;
}
//Three setter functions to set values for all data members individually
// Three getter function to get value of all data members individually
void setCarName(string s)
{
carName=s;
}
void setIgnition(bool ig)
{
ignition=ig;
}
void setCurrentSpeed(int speed)
{
currentSpeed=speed;
}
string getCarName()
{
return carName;
}
bool getIgnition()
{
return ignition;
}
int getCurrentSpeed()
{
return currentSpeed;
}
//A member function setSpeed( ) // takes integer argument for setting speed
void setSpeed(int sp1)
{
currentSpeed=sp1;
}
};
//Derive a class named Convertible
class Convertible:public Car
{
//A data member top (of Boolean type)
public:
bool top;
public:
//A no-argument constructor to assign default value as “false” to top
Convertible()
{
top=false;
}
//A four argument constructor to assign values to all data-members i.e. carName, ignition,
//currentSpeed and top.
Convertible(string n,bool i,int s,bool t):Car(n,i,s)
{
carName=n;
ignition=i;
currentSpeed=s;
top=t;
}
// A setter to set the top data member up
void setTop(bool t)
{
top=t;
}
//A function named show() that displays all data member values of invoking object
void show()
{
cout<<"Car name is:"<<carName<<endl;
cout<<"Ignition is: "<<ignition<<endl;
cout<<"Current Speed is :"<<currentSpeed<<endl;
cout<<"Top is:"<<top<<endl;
}
};
//main function
int main()
{
//creating object for Convertible class
Convertible c1("Audi",true,100,true);
c1.show();
c1.setCarName("Benz");
c1.setIgnition(true);
c1.setCurrentSpeed(80);
c1.setTop(true);
c1.show();
cout<<"Car Name is: "<<c1.getCarName()<<endl;
cout<<"Ignition is:"<<c1.getIgnition()<<endl;
cout<<"Current Speed is:"<<c1.getCurrentSpeed()<<endl;
return 0;
}
1)What is Big Data?
2) What is machine learning?
3) Give one advantage of Big data analytics.
4) Give any one application of Big Data Analytics. 5) What are the features of Big Data Analytics?
Answer:
Big data is defined as the extremely large data set that may be analysed computationally to reveal pattern,trends and associations, related to human behaviour and interaction.
Machine learning is a sub area of artifical intelligence where by the terms refers to the ability of IT system to independently find the solution to problem by reconnaissance pattern in databases.
The one advantage of bigdata is
To ensure hire the right employees.
The application of bigdata data is
to communicate media application nd entertainment
10+2 is 12 but it said 13 im very confused can u please help mee
Mathematically, 10+2 is 12. So your answer is correct. However, if you are trying to write a code that adds 10 + 2, you may need to troubleshoot the code to find where the bug is.
What is troubleshooting?Troubleshooting is described as the process through which programmers detect problems that arise inside a specific system. It exists at a higher level than debugging since it applies to many more aspects of the system.
As previously stated, debugging is a subset of troubleshooting. While debugging focuses on small, local instances that can be identified and fixed in a single session, troubleshooting is a holistic process that considers all of the components in a system, including team processes, and how they interact with one another.
Learn more about Math operations:
https://brainly.com/question/199119
#SPJ1
Write a program that tells what coins to give out for any amount of change from 1 cent to 99 cents. For example, if the amount is 86 cents, the output would be something like the following:
86 cents can be given as 3 quarters 1 dime and 1 penny
Use coin denominations of 25 cents (quarters), 10 cents (dimes), and 1 cent (pennies). Do not use nickel and half dollar coins. Your program will use the following function (among others):
void computeCoin(int coinValue, int& number, int& amountLeft);
For example, suppose the value of the variable amountleft is 86. Then, after the following call, the value of number will be 3 and the value of amountLeft will be 11 (because if oyu take three quarters from 86cents, that leaves 11 cents):
computecoins (25, number, amountLeft);
Include a loop that lets the user repeat this computation for new input values until the suer says he or she wants to end the program (Hint: use integer division and the % operator to implement this function.)
Add all numbers up
and you will get your sum
Is e commerce a challenge or opportunity to the freight forwarder
Answer:
It can be both
Explanation:
This all depends on how that e commerce is planning on handling their deliveries. Taking Amazon as an example, they're probably top customers from FedEx and UPS (and others as well), which at a very beginning this has shown a great opportunity for these companies. However, Amazon has started to show interest in starting their own delivery which also poses a huge risk.
What is the main difference between Trademarks and Copyrights?
Trademarks have not enter the Public Domain as long as the company exists.
Trademarks convert any mark you make into a copyrightable IP
Trademarks give you the right to trade IPs with other companies.
Trademarks allow you to get around the copyright laws and keep your IP from entering Public Domain.
Giving brainliest if it’s right.
Answer:
copyrights protect creative or intellectual works, and trademarks apply to commercial names, phrases, and logos
Explanation:
How has the history of computers had an impact on the technology we use daily?
In your own words please:)
Answer:
In hospitals, most of the equipments use or are run by computers. Look at space exploration; it was all made possible with the advent of computer technology. In the job sector, many of the jobs require knowledge in computers because they mostly involve the use of computers.
The early computers were not that small as those used today and they were commonly used to help in working out complex calculations in mathematics that proved tedious to be done manually. This is why the first machine was called by some as a calculator and others as a computer because it was used for making calculations.
Hope it helps
what is the least expensive way to connect five computers using a wired network to a router that has only four network ports?
Answer: Get wifi.
Explanation: Get wifi.
Which of the following statements are true about how technology has changed work? Select 3 options. Responses Businesses can be more profitable by using communication technology to reduce the costs of travel. Businesses can be more profitable by using communication technology to reduce the costs of travel. With the spread of technology and the Internet, smaller businesses are not able to compete as effectively as before. With the spread of technology and the Internet, smaller businesses are not able to compete as effectively as before. In a gig economy, workers are only hired when they are needed for as long as they are needed. In a gig economy, workers are only hired when they are needed for as long as they are needed. Through the use of the Internet and collaboration tools more workers are able to perform their jobs remotely. Through the use of the Internet and collaboration tools more workers are able to perform their jobs remotely. Technology has not really changed how businesses operate in the last fifty years. Technology has not really changed how businesses operate in the last fifty years.
The three genuine statements almost how technology has changed work are:
Businesses can be more productive by utilizing communication technology to decrease the costs of travel. This can be genuine since advances like video conferencing and virtual gatherings permit businesses to conduct gatherings, transactions, and collaborations remotely, lessening the require for costly travel courses of action.With the spread of technology and the Web, littler businesses are not able to compete as successfully as some time recently. This explanation is genuine since innovation has empowered bigger companies to use their assets and reach a worldwide advertise more effortlessly, making it challenging for littler businesses to compete on the same scale.Through the utilize of the Web and collaboration devices, more laborers are able to perform their occupations remotely. This explanation is genuine as innovation has encouraged farther work courses of action, allowing employees to work from anyplace with an online association. Collaboration instruments like extend administration computer program and communication stages have made inaccessible work more doable and effective.Technology explained.
Technology alludes to the application of logical information, aptitudes, and devices to form innovations, fathom issues, and move forward proficiency in different spaces of human movement. It includes the improvement, usage, and utilize of gadgets, frameworks, and processes that are outlined to achieve particular assignments or fulfill specific needs.
Technology can be broadly categorized into distinctive sorts, such as data technology, communication technology, therapeutic innovation, mechanical technology, and transportation technology, among others. These categories include different areas, counting computer science, hardware, broadcast communications, building, and biotechnology.
Learn more about technology below.
https://brainly.com/question/13044551
#SPJ1
In a single paragraph, write about the work of the web designer and evaluate the importance of their knowledge of "code."
Web designers are responsible for creating visually appealing and user-friendly websites. Their knowledge of code is crucial for implementing design elements and ensuring smooth functionality.
Why is web design important?A well-designed website may help you make a strong first impression on potential consumers.
It may also assist you in nurturing your leads and increasing conversions. More significantly, it gives a nice user experience and allows your website visitors to easily access and explore your website.
Learn more about web design at:
https://brainly.com/question/22775095
#SPJ1
A method which applies to the class in which it is declared as a whole and not in response to method calls on a specific object is called a:_______
a. method call
b. an object method
c. private method
d. static method
Answer:
D) Static method
Explanation:
A static method is a method that is created only for the class and not it's instance variables or objects. Such methods can only be accessed by calling them through the class's name because they are not available to any class instance. A static method is created by prefixing the method's name with the keyword static.
A static method cannot be overridden or changed. You create a static method for a block of code that is not dependent on instance creation and that can easily be shared by all instances or objects.
Device A is attempting send data over the internet to device E which of the following is true of how the data will travel through the network
Answer:
so, if its a multiple question its better to give us the choices, but I know the info would go to a server and then the server would transport the info to the other computer.
Explanation:
where do you think data mining by companies will take us in the coming years
In the near future, the practice of companies engaging in data mining is expected to greatly influence diverse facets of our daily existence.
What is data miningThere are several possible paths that data mining could lead us towards.
Businesses will sustain their use of data excavation techniques to obtain knowledge about each individual customer, leading to personalization and customization. This data will be utilized to tailor products, services, and advertising strategies to suit distinctive tastes and requirements.
Enhanced Decision-Making: Through the use of data mining, companies can gain valuable perspectives that enable them to make more knowledgeable decisions.
Learn more about data mining from
https://brainly.com/question/2596411
#SPJ1
Which swap is successful? >>> x = 5 >>> y = 10 >>> temp = x >>> y = x >>> x= temp >>> temp = x >>> x=y >>> y = temp >>> temp = x >>> y=temp >>> x=y
Answer:
>>> temp = x
>>> x = y
>>> y = temp
Explanation:
got a 100% on the assignment
dofemines the colour Hoto to Windows - Frome
You can use these techniques to figure out the colour photo in Windows. Open the image or photo file on your Windows computer first.
Then, check for choices or tools linked to colour settings or modifications, depending on the picture viewer or editor you're using.
This could be found under a menu item like "Image," "Edit," or "Tools." You can adjust a number of factors, including brightness, contrast, saturation, and hue, once you've accessed the colour options, to give the shot the appropriate colour appearance.
Play around with these options until you get the desired colour result.
Thus, if necessary, save the altered image with the new colour settings.
For more details regarding Windows, visit:
https://brainly.com/question/17004240
#SPJ1
Your question seems incomplete, the probable complete question is:
determine the colour photo to Windows
PLEASE HELP IN JAVA
A contact list is a place where you can store a specific contact with other associated information such as a phone number, email address, birthday, etc. Write a program that first takes as input an integer N that represents the number of word pairs in the list to follow. Word pairs consist of a name and a phone number (both strings), separated by a comma. That list is followed by a name, and your program should output the phone number associated with that name. Output "None" if name is not found. Assume that the list will always contain less than 20 word pairs.
Ex: If the input is:
3 Joe,123-5432 Linda,983-4123 Frank,867-5309 Frank
the output is:
867-5309
Your program must define and call the following method. The return value of getPhoneNumber() is the phone number associated with the specific contact name.
public static String getPhoneNumber(String[] nameArr, String[] phoneNumberArr, String contactName, int arraySize)
Hint: Use two arrays: One for the string names, and the other for the string phone numbers.
Answer: import java.util.Scanner;
public class ContactList {
public static void main(String[] args) {
Scanner scnr = new Scanner(System.in);
// Read the number of word pairs in the list
int n = scnr.nextInt();
scnr.nextLine(); // Consume the newline character
// Read the word pairs and store them in two arrays
String[] names = new String[n];
String[] phoneNumbers = new String[n];
for (int i = 0; i < n; i++) {
String[] parts = scnr.nextLine().split(",");
names[i] = parts[0];
phoneNumbers[i] = parts[1];
}
// Read the name to look up
String name = scnr.nextLine();
// Call the getPhoneNumber method to look up the phone number
String phoneNumber = getPhoneNumber(names, phoneNumbers, name, n);
// Print the phone number, or "None" if the name is not found
if (phoneNumber != null) {
System.out.println(phoneNumber);
} else {
System.out.println("None");
}
}
public static String getPhoneNumber(String[] nameArr, String[] phoneNumberArr, String contactName, int arraySize) {
// Search for the name in the array and return the corresponding phone number
for (int i = 0; i < arraySize; i++) {
if (nameArr[i].equals(contactName)) {
return phoneNumberArr[i];
}
}
// If the name is not found, return null
return null;
}
}
Explanation: The program inputs the number of word sets, stores them in two clusters (names and phoneNumbers), and looks up a title by calling the getPhoneNumber strategy to return the comparing phone number. Prints phone number or "None" in the event that title not found. getPhoneNumber strategy takes nameArr, phoneNumberArr, contactName, and arraySize as contentions. The strategy looks for a title and returns the phone number in case found, something else invalid.
Protecting an IT system from security threats in a small business is the responsibility of the
Question 7 options:
IT Specialist
IT Manager
IT Department
IT CEO
Protecting an IT system from security threats in a small business is the responsibility of the: IT Specialist. (Option A)
What is an IT security threat?A threat in computer security is a potential bad action or occurrence enabled by a vulnerability that has an unfavorable impact on a computer system or application.
These three frequent network security vulnerabilities are likely the most hazardous to businesses: Malware, advanced persistent threats and distributed denial-of-service assaults are all examples of advanced persistent threats.
IT professionals create, test, install, repair, and maintain hardware and software in businesses. Some businesses will have their own IT team, although smaller businesses may use freelance IT employees for specific jobs.
Learn more about Security Threats:
https://brainly.com/question/17488281
#SPJ1
Answer:
IT Specialist so option A
The computer boots normal but soon turns off. When rebooted, it dies again. It works for a few minutes in the morning, but throughout the day, it only boots after it has been turned off for over an hour, then turns off again as soon as the windows desktop appears. What are your troubleshooting steps and repairs that you, the on-call technician, will use to resolve this malfunction? What went wrong? How did you fix it? How much must you charge the customer?
Answer:
If I would have been there firstly I will not any for it second it has been happend to my PC 1 or 2 week ago if you are using Windows 7 cuz I have 7 . So two black screen appear press the reboot key and wait for 2nd screen, and if it would not come again reboot till it appear then press [Del]
key and some adjustments and press enter and it would ask for saving so press Y and enter you are all done
3
Drag each label to the correct location on the image.
An organization has decided to initiate a business project. The project management team needs to prepare the project proposal and business
justification documents. Help the management team match the purpose and content of the documents.
contains high-level details
of the proposed project
contains a preliminary timeline
of the project
helps to determine the project type,
scope, time, cost, and classification
helps to determine whether the
project needs meets business
needs
contains cost estimates,
project requirements, and risks
helps to determine the stakeholders
relevant to the project
Project proposal
Business justification
Here's the correct match for the purpose and content of the documents:
The Correct Matching of the documentsProject proposal: contains high-level details of the proposed project, contains a preliminary timeline of the project, helps to determine the project type, scope, time, cost, and classification, helps to determine the stakeholders relevant to the project.
Business justification: helps to determine whether the project needs meet business needs, contains cost estimates, project requirements, and risks.
Please note that the purpose and content of these documents may vary depending on the organization and specific project. However, this is a general guideline for matching the labels to the documents.
Read more about Project proposal here:
https://brainly.com/question/29307495
#SPJ1
for the computer with which you are most familiar or use most frequently list its specifications in terms of
its primary or working memory
All forms of data storage technology that are integrated into or can be linked externally to a computer device or server are collectively referred to as computer memory.
Thus, The computer accesses the major and secondary memory types in accordance with how they are being used.
The central processing unit (CPU) can access data stored in some forms of computer memory quickly because of their design. Other types can store vast amounts of data economically because they are made to be low-cost.
The CPU can access primary memory directly. RAM is a type of temporary memory that only stores information that the CPU is currently using. Non-volatile memory that has been electronically updated after manufacturing is read-only memory (ROM).
Thus, All forms of data storage technology that are integrated into or can be linked externally to a computer device or server are collectively referred to as computer memory.
Learn more about Computer, refer to the link:
https://brainly.com/question/32297640
#SPJ1
what is the meaning of antimonographycationalis
Answer:
Although this word was made up in order to be a contender for the longest word in English, it can be broken down into smaller chunks in order to understand it.
Anti- means that you are against something; monopoly means the exclusive control over something; geographic is related to geography; and the remaining part has to do with nationalism.
So this word means something like 'a nationalistic feeling of being against geographic monopoly,' but you can see that it doesn't have much sense.
(answer copied from Kalahira just to save time)