1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
densk [106]
2 years ago
10

How is your favorite singer and why I will give Brainliest

Computers and Technology
2 answers:
Lorico [155]2 years ago
5 0

Answer:

Eslabon Armando

His songs hit different ;-;

gayaneshka [121]2 years ago
3 0

Answer:

my favorite singer is the band sleeping at last, Kodaline is really good too

Explanation:

brainliest

You might be interested in
program that initialises a vector with the following string values: “what” “book” “is” “that” “you” “are” “reading”.
Zanzabum

A program that initializes a vector with the following string values: “what” “book” “is” “that” “you” “are” “reading” are the usage of namespace std;int main().

<h3>What is a vector software program?</h3>

Vector images software program permits customers to layout and manages pc photos the usage of geometric and mathematical commands, instead of clicks and strokes as utilized in drawing software program. Vector photos created the usage of those applications may be scaled indefinitely with out dropping quality.

  1. #include
  2. #include
  3. #include
  4. the usage of namespace std;
  5. int main()
  6. ;
  7. vector::iterator it;
  8. for (it = vs.begin(); it != vs.end(); it++)
  9. string tmp;
  10. while (cin.get()!='n')
  11. for (it = vs.begin(); it != vs.end(); it++)
  12. }

Read more about the vector :

brainly.com/question/25705666

#SPJ1

3 0
1 year ago
To store non-duplicated objects in the order in which they are inserted, use:______
Umnica [9.8K]

Answer:

b. LinkedHashSet

Explanation:

A LinkedHashSet is an ordered version of HashSet that maintains a doubly-linked List across all elements. When the iteration order is needed to be maintained this class is used. LinkedHashSet maintains a linked list of the entries in the set, in the order in which they were inserted.

4 0
3 years ago
Which of the following keys moves the insertion point to the end of data in a cell?
IgorC [24]
C) End is the key that moves the insertion point to the end of data in a cell. 
5 0
3 years ago
Read the quotation from "Song of Myself."
Phantasy [73]

Based on the first stanza from "Song of Myself," the overall style suggests: B. that Whitman's style allows for various kinds of language.

<h3>What is a poem?</h3>

A poem is a literary work that comprises either written or spoken words which are carefully chosen and arranged in separate lines, especially based on their diction (sound), rhythm, and meaning.

Based on the first stanza from "Song of Myself," we can infer and logically conclude that the overall style suggests: B. that Whitman's style allows for various kinds of language.

Read more on Whitman's style here: brainly.com/question/12881683

#SPJ1

6 0
2 years ago
What are experts in technology who use their knowledge to break into computers and networks, for profit or just as a challenge k
insens350 [35]

Answer:

Hacker

Explanation:

Hacker -

It refers to the computer software expert , who is responsible to break into the unauthorized networks or computer , is referred to as a hacker .

The hacker is skilled with exceptional computer and computer software knowledge .

Hacking is an illegal practice , as the person is able to access some confidential and personal data and information of any other person or organisation .

Hence , from the given information of the question ,

The correct term is hacker .

3 0
3 years ago
Other questions:
  • ____ is a linux-based operating system developed by the open handset alliance.
    13·1 answer
  • I made a binary sentence if you answer you get 75 points heres the code: 01101001 01100110 00100000 01111001 01101111 01110101 0
    9·2 answers
  • Using a pin or password in addition to tpm is an example of what type of authentication?
    13·1 answer
  • Which one of the following is an example of hacktivism according to you and why?
    11·1 answer
  • The company where Derek works has tasked him with setting up and securing a SOHO router. He wants to make sure the wireless netw
    7·1 answer
  • Write a static boolean method named beginsWithZ. It should accept a String object as a parameter. It should return true if the f
    12·1 answer
  • What tab should you choose if you want to practice presenting with your PowerPoint slides?
    5·2 answers
  • Your _______ can help block inappropriate content online.<br> 1. web browser<br> 2. Password
    14·1 answer
  • How has technology effected the way we communicate?
    5·1 answer
  • Which statement in main() generates an error?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!