1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Veseljchak [2.6K]
2 years ago
7

What does it mean when someone says your voice doesn’t match how u look

Computers and Technology
1 answer:
pantera1 [17]2 years ago
4 0

Explanation:

it means that your voice it doesn't match with your personality like 2 characteristics by voice and by personality

You might be interested in
Any websites online to make $50 daily?​
andreyandreev [35.5K]

Answer:

hmmm research some and find out because there are alot

7 0
3 years ago
Write the definition of a method printGrade, which has a char parameter and returns nothing.The method prints on a line by itsel
o-na [289]

Answer:

The answer to this question can be given as:

Method Definition:

void printGrade(char x) //declare method with parameter.  

{

 

//method body

System.out.println("Grade: "+x);

 //print value in new line.

}

Explanation:

In the above method definition, we define a method that's name is already given in the question that is printGrade. This method does not return any value because its return type is void. In this method, we pass a char variable as a parameter. Then we define the method body in the method body we print the value of the char variable in the new line. To print the value in the new line we use the println function in java.

5 0
3 years ago
NEEDED ASAP
kogti [31]

Explanation:

1. special key combination that causes specific commands to be executed typically shortcut keys combine the ctrl or alt keys with some other keys.

2. 5 example of shortcut keys are:-

  • 1. ctrl + A - select all
  • 2.ctrl + B - bold
  • 3. ctrl + C - copy
  • 4. ctrl + U - under line
  • 5. ctrl + v - paste

3. (i) open the start menu

(ii) open Windows task manager

(iii) close the currently active program

(iv) replace

(v) align center

4. the three importance of shortcut keys are :

  • efficient and time saving :- using shortcut make you more efficient at doing certain task on your computer .
  • multi-tasking :- being a multi Tasker is something required in life.
  • health benefit :- cutting down on your mouse usage by using keyboard shortcut can help reduce the risk of RSI (Repetitive Syndrome Injury).

5. shortcut keys are very helpful because it take less time. keyboard shortcuts are generally used to expedite common operation by reducing input sequence to a few keystrokes.

8 0
3 years ago
What can be used to store data, plant viruses, or steal data?
SCORPION-xisa [38]

Answer:

<u>ITS A SIMPLE ANSWER BUT THE PROBLEM IS TOO BIG!</u>

Explanation:

The phishing email might contain a link which on clicking will take you to a fake web page. For example, the link might take you to a fake bank website which looks very legitimate but in reality is just a lookalike. If the victim falls for the scam and enters his/her account details on the website, the details will actually go to the hacker's server instead of going to the bank and the hacker will have all the information that the victim has provided on the website.

4 0
3 years ago
To uncompress the data back into its original binary state. True or False
sweet [91]

Answer:

The answer to the given question is "True".

Explanation:

To uncompress the information to their original binary status we use Lossless compression. It is a technique for decompresses data. This technique reduces a file's size. It no reduce the quality of the file. In other words, we can say that It is used for rewrites the data. and it uncompresses the file more efficiently, the initial archive. That's why the answer to this question is "True".

7 0
3 years ago
Other questions:
  • Technology can most broadly be defined as anything that does which of the following ?
    11·1 answer
  • Collaboration, listening, and negotiating are considered _____ skills.
    5·1 answer
  • Identify characteristics of top-down programming design. Choose all that apply.
    13·1 answer
  • Jennifer frequently uses a few programs on her laptop. Where will she find all the frequently used program icons in her computer
    13·1 answer
  • What is added to the &lt; meta &gt;tag to describe the encoding type?
    15·1 answer
  • The statement cout &lt;&lt; sales[0,3] + sales[1,3]; will __________. Use the following array named sales to answer this questio
    14·1 answer
  • An expression involving byte, int, and literal numbers is promoted to which of these?
    12·1 answer
  • How many different passwords are possible if each character may be any lowercase letter or digit, and at least one character mus
    6·1 answer
  • How is a geometric constraint different from a numeric constraint?
    12·1 answer
  • In which situations would it be most helpful to filter a form? Check all that apply.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!