1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ahat [919]
2 years ago
11

You defined a shoe data type and created an instance.

Computers and Technology
1 answer:
Assoli18 [71]2 years ago
7 0

Answer:

myShoe.type = 'sneaker'

Explanation:

type is a field of the class shoe. The myShoe object which is an instance of the class shoe has the field type also.

To assign a value to type filed of the object myShoe, reference the object then the field as such;

   myShoe.type = "sneaker"

You might be interested in
If a user’s current directory is /home/mary/project1, which command could she use to move to the etc directory directly under th
kykrilka [37]

Answer:

Option 4 is the correct answer to the above question.

Explanation:

In the Linux operating system, The etc folder is listed on the root directory. When any user wants to go in the root directory of the Linux operating system from anywhere, then he needs to follow the command of the name of the folder where he wants to go with the '/' symbols. The above question states that the user wants to go to the etc folder of the root directory, then he needs to press the command '/etc' with the help of cd command because cd command is used to open any folder. So the option 4 is the correct, while the other is not because--

  • Option 1 states about cd which gives the error.
  • Option 2 states about cd /home/mary/etc which take the user to the etc folder which is in the mary folder.
  • Option 3 states about the cd etc which is used to take the user on the etc folder which is in the current folder.
  • Option 5 states about the cd\etc which gives the error.
8 0
3 years ago
How do take a picture on this to ask?
Galina-37 [17]
What computer are you on, To take a screenshot on a chromebook press control shift then the switch screens button

If any other computer use snipping tool. Or look up how to screenshot on (Your computer)

Then click that paperclick and go to the file of the screenshot and click it. Then type in a question and click ask.
3 0
3 years ago
What is one problem you should keep in mind when researching information on the Internet?
shepuryov [24]
The answer is A due to the internet being a plethora of information being accessed by anyone and everyone with internet access. Any person of no background to certain information could claim mastery to the field and sway his/her audience to ways possible. Ensuring that the source of the information being read is from credible and reputable companies. You can do this by ensuring the information is from newspapers with names known all over the world or there are also sourced footnotes from the author where they could have cited some information from other articles. 
5 0
3 years ago
Read 2 more answers
You listened to a song on your computer. Did you use hardware, software, or both?
Bogdan [553]
The answer to your question is: <span>Explain- </span>
<span>The CPU, monitor, speaker or earphone, keyboard, mouse etc. that you can touch are hardware. </span>
<span>The software or program such as the operating system, windows media player, ms office, paint etc that you cannot touch actually but they are shown on the monitor are called software. </span>

<span># You play the music with Windows media player or any music player that means you are using software. And the software itself is showing on the monitor(hardware) that is run by CPU, another hardware. </span>

<span>Hope you got it.. Please give me brnliest.



</span>
7 0
3 years ago
Read 2 more answers
Henry is working from a USDA office. He has several tasks to perform today: 1) he logs onto his USDA computer to get started; 2)
Ksivusya [100]

Answer:

  A. Using a cell phone to discuss sensitive information

Explanation:

In general, cell phone signals are not secure. Cell phones without appropriate encryption should never be used to discuss sensitive information.

3 0
3 years ago
Other questions:
  • Si han visto el anime death note esta chido si no lo han visto veanlo es bien vacano
    6·1 answer
  • When there is flooding and you see pooled water, what should you do?
    13·1 answer
  • WHAT DOES THE WORD MONOCHROME MEAN?
    11·1 answer
  • What is the unit of measure that specifies the value of cellspacing?
    9·1 answer
  • What does the line of red semicircles mean on a weather map
    11·1 answer
  • How do you leave a conversation or group text on iphone (ios 10)? Help!!
    5·1 answer
  • _______ memory allows data to be both read from and written to easily and rapidly.
    7·1 answer
  • Which of the following illustrations is depicted in the icon that's used to access Windows Help and Support files?
    13·1 answer
  • What phobia is a fear of computers or working on a computer?
    6·1 answer
  • A small network used for communication between personal computing devices is known as?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!