1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sophie [7]
2 years ago
8

Task 2

Computers and Technology
2 answers:
USPshnik [31]2 years ago
6 0
4.
3.
1.
5.
2.
I rearranged them so the program would make sense by arranging the interaction in a logical order then placing input statements in between
Damm [24]2 years ago
4 0
4.
3.
1.
5.
2.
I arranged it in an orderly and most interactive manner including it with the Scanner input class
You might be interested in
What might be the best response to a cyberbuly attack
Fynjy0 [20]
If you experience a cyberbully attack, you should get an adult and report the bully.
4 0
3 years ago
Read 2 more answers
You can toggle between different types of references by pressing the ____ key on your keyboard.
ioda
<span>You can toggle between different types of references by pressing the F4 key on your keyboard.</span>
3 0
3 years ago
Strobe lights can become more yellow as they age true or false
guajiro [1.7K]
False they can have a yellow setting but the light is always white

6 0
3 years ago
burger hut is trying to decide if it can receive money from the government for providing employees with insurance .
lawyer [7]

Answer:

A cell grows to its full size, The cell copies its DNA

have a great weekends, hopefully it was the right answer!

8 0
3 years ago
Which of the following is not a concern that has come out of the widespread adoption of the Internet?
slamgirl [31]

Answer:

The correct option is;

Selecting the correct browser to use for the sites you want to visit

Explanation:

Censorship of information is the subduing of information based on the consideration of such information being harmful or inconvenient

Increased anonymity

Making an individual anonymous which is one of the capabilities of the internet, is seen as encouraging unethical behavior and promoting discussions which are deemed uncivil in a commonly shared space online.

Unauthorized sharing of copyrighted information

The sharing and distribution of copyrighted material is against the law but it is a common occurrence and in various formats online

Out of the given options, selecting the correct browser to use for the sites you want to visit is the one that is not a concern.

5 0
3 years ago
Other questions:
  • The time between requests to a web server is exponentially distributed with mean 0.5 seconds. NOTE: This is a multi-part questio
    8·2 answers
  • __________ can be used to replace internal network addresses with one or more different addresses so the traffic that actually t
    9·1 answer
  • PLEASE HELP FAST !!!!!!!!!!
    12·1 answer
  • Consider an application that transmits data at a steady rate (for example, the sender generates N-bit unit of data every k time
    7·1 answer
  • What output is generated by this for loop?
    6·1 answer
  • This is a human-made physical system.
    15·1 answer
  • _________ can be used to provide access control, confidentiality, data origin authentication, connectionless integrity, rejectio
    12·1 answer
  • How do you do 1.17.5, invert colors, on codehs?
    10·1 answer
  • Working mechanism of computer ​
    10·1 answer
  • Large and fast disks should be used for as doing so will ensure work is done as quickly as possible?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!