1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitrij [34]
2 years ago
5

Choose the expression that belongs in the blank in order to ask the user the question shown.

Computers and Technology
1 answer:
Rudik [331]2 years ago
6 0

Answer:

"Juan"

Explanation:

If this is script, than that should be the correct argument.

You might be interested in
1.Discuss the complexities of owning and sharing digital information.
iren [92.7K]

Answer:

1. The problem with sharing or owning digital information is, anything on the internet is on there forever. It never truly goes away. There are many hackers on the internet that could easily steal that important information. The internet is a fun, resourceful, way of sharing and giving, but it does come with it's downfalls.

2. People who are harmed by copyright policies are- Content creators, if they include a tiny sliver of a song the whole video gets copyrighted and strips them of their money.

Who benefits from copyright policies? Singers, Artist, Brands.

4 0
3 years ago
Public static void prefixmerge(customer[] list1, customer[] list2, customer[] result {
White raven [17]
I can't get what do you need, but I guess it's a part of java code. I can explain what it means. It's used to unite two rising sorted arrays which are list1 and list2. The result is stored in result array. I suggest you to clearly explain your task as it's difficult to give you correct answer.
8 0
4 years ago
Storage that is wiped clean when power is cut off from a device is known as _____.
Sveta_85 [38]
<span>Volatile. An example would be RAM.</span>
4 0
3 years ago
A closed-source product is typically free.TrueFalse
CaHeK987 [17]

Answer:

False

Explanation:

A closed-source product is often closed-source to protect intelectual property and prevent replication.

6 0
3 years ago
Write an algorithm that describes the second part of the process of making change (counting out the coins and bills).
Alenkasestr [34]

An Algorithm that describes the second part of the process can be written as listed below :

<h3>Algorithm describing the second part of the process of making change (counting out the coins and bills ) </h3>

<u>First step</u> : Initialize the required variables to zero to determine the number of coins and bills.

<u>Second step</u> : Prompt and read the amount to convert. amount to Hundreds

<u>Third step</u> : Compute hundred bill note as 100 amount equal to  ( amount% * 100 fifties - amount )

<u>Fourth step </u>: Compute fifty bill notes as :  ( amount% * 50 fifty bill notes )

<u>Fifth Step</u> : Compute Twenty bill notes as amount equal to ( amount% *20 Twenties - amount )

<u>Sixth Step</u> : Compute Tens bill notes as : ( amount% * 10 Tens bill notes )

<em>Note : continue the process for fives, Quarters, Dimes, Nickels, and Pennies. </em>

<em />

Learn more about Algorithm : brainly.com/question/13800096

#SPJ1

<u>Attached below is the missing part of the question </u>

<em>Write an algorithm that describes the second part of the process of making change (counting...</em>

3 0
2 years ago
Other questions:
  • As you move the click and type pointer around the document, the icon changes to represent ____________________ that will be appl
    10·2 answers
  • Silver, lead, and hydrogen are examples of what type of matter?
    12·1 answer
  • A list of the slides in a presentation is found here.
    7·2 answers
  • Which of the following statements will assign the contents of the Text property of a Textbox control named txtInput into the Tex
    10·1 answer
  • Under the advanced options screen, what startup option should be enabled in order to view what did and did not load during the b
    12·1 answer
  • Sending a employee an email with important criticism represents a problem which communication process
    9·1 answer
  • Five differences between monitor and printer
    15·1 answer
  • Within a table, the intersection of a row and a column creates a(n) ____.
    13·1 answer
  • The ELECTRONIC COMMUNICATIONS PRIVACY ACT prohibits unauthorized eavesdropping by all persons, businesses, and the government.
    5·1 answer
  • Harry has created a Microsoft Excel workbook that he wants only certain people to be able to open. He should use
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!