1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mrs_skeptik [129]
1 year ago
12

Your client Mr. Smith has requested a reservation at Eleven Madison Park this evening for a party of 2 at 6PM. Unfortunately, th

e restaurant is fully committed. As an alternative, which restaurant would you suggest? You can use the internet to research the right answer. The Olive Garden Le Bernardin The French Laundry
Computers and Technology
1 answer:
hoa [83]1 year ago
5 0

According to the map advisor, the best alternative and the closest restaurant for the party to Eleven Madison Park from the options listed is " The Olive Garden" (Option A) which is 27 minutes away.

<h3>What is a restaurant?</h3>

A restaurant is a place where you may dine and pay for your meal. A waiter or waitress will normally bring your meal to your table in a restaurant. Breakfast, lunch, and supper are all available at the restaurant. The restaurant's cuisine was delicious, and the staff were kind.

Restaurants have always fulfilled a human desire for connection and formed social ties in addition to providing food and drink. Restaurants play an increasingly essential role in defining our entire economy as well as the structure and makeup of our cities in the twenty-first century.

Learn more about the restaurant:
brainly.com/question/5705480
#SPJ1

You might be interested in
Four-pair UTP uses ________ connectors a)snap b)ST or SC c)None of these
Oliga [24]

Explanation & answer:

Four pair UTP (unshielded twisted pair) cables are common cables with RJ45 connectors.  Most RJ45 connectors have a snap to lock the male connector in place.

ST and SC connectors are for fibre-optics.

4 0
3 years ago
45 points pls help
Artemon [7]

Answer:

Repetition.

Explanation:

hope it helps u

can u mark me as brainliest

8 0
3 years ago
Read 2 more answers
Paavo was reviewing a request by an executive for a new subnotebook computer. The executive said that he wanted USB OTG support
grandymaker [24]

Answer:

Connecting a mobile device as a peripheral to an infected computer could allow malware to be sent to that device.

Explanation:

Since in the question it is mentioned that Paavo reviewed a request by an executive for subnotebook computer i.e new. but he needs to USB OTG support so it is a  USB i.e on the go that links the devices from one device to another

Therefore by links the mobile device to the computer i.e infected that allows malware we called virus so that we are able to send it to that device. By this,  he wants to tell about the USB OTG security

4 0
3 years ago
Create a class named Horse that contains the following data fields: name - of type String color - of type String birthYear - of
kozerog [31]

Answer:

The program to this question can be given as:

Program:

class Horse   //define class Horse

{  

private String name;   //define variables.

private String color;  

private int birthYear;  

//define set method.

public void setName(String name)  

{  

this.name = name; //set value of name.

}

public void setColor(String color)  

{  

this.color = color; //set value of color.  

}  

public void setBirthYear(int birthYear)

{  

this.birthYear = birthYear;  //set value of birthYear

}  

//define get method.

public String getName()  

{  

return name;  //return name.

}  

public String getColor()

{  

return color;  //return color.

}  

public int getBirthYear()

{  

return birthYear;  //return birthYear.

}  

}

class RaceHorse extends Horse     //define class RaceHorse  

{

private String raceNum;            //define variable.

public void setRace(String raceNum)    //define set method.

{

 this.raceNum=raceNum;      //set value of raceNum.

}

public String getRace()

{

 return raceNum;   //return raceNum

}

}

public class Main      //define main class.

{

public static void main(String[] args) //define main method.

{

 Horse ob= new Horse();  //creating class objects.

 RaceHorse ob1 = new RaceHorse();

 ob.setName("XXX");       //calling function

 ob.setColor("BLACK");

 ob.setBirthYear(2008);

 ob1.setRace("Five hundred meter");

 //print return values.

       System.out.println("The name of the horse is " + ob.getName()+"." +"\n"+  

   "The horse's color is " + ob.getColor()+"."+"\n"+ "It was born in " + ob.getBirthYear() +  

   "."+"\n"+ ob.getName()+" has taken part in " + ob1.getRace() + " races.");

   

}

}

Output:

The name of the horse is XXX.

The horse's color is BLACK.

It was born in 2008.

XXX has taken part in Five hundred meter races.

Explanation:

In the above program firstly we declare the class that is Horse in this class we define a variable that name is already given in the question which are name, color, and birthYear. In these variables are name and color datatype is string and the birthYear datatype is an integer because it stores the number. Then we use the get and set function in the get function we return all variable value. and in the set function, we set the values of the variable by this keyword. Then we declare another class that is RaceHorse this class inherit Horse class. In the RaceHorse class, we define a variable that is raceNum that's data type is a string in this class we also used the get and set function. Then we declare the main class in the main class we define the main method in the main method we create the above class object and call the set and get function and print the values of the function.

6 0
3 years ago
Why online fraud rose 79% in UK after they switched to the chip and PIN system in the first three years?
irakobra [83]

Answer:

TBH I HAVE NO FREAKING IDEA BUT I NEED POINTS BC IM DOING AN EXAM AND HAVE NO MONEY SORRY

5 0
2 years ago
Other questions:
  • What happens if you give false information on your driver license application?
    12·1 answer
  • What is the difference between the (BIOS) basic.input.output.system and R.O.M
    5·1 answer
  • . One of the vulnerabilities the Morris worm used was a networking service called finger. The purpose of the finger service is t
    11·1 answer
  • Help me please and thanks
    8·1 answer
  • HELP QUICKLY!!! IF YOUR RIGHT I'LL MARK YOU BRAINLIEST
    15·2 answers
  • 50 POINTS! What can be viewed in the Tasks folder? Check all that apply.
    13·2 answers
  • The road is closed a head
    9·1 answer
  • Which is an example of artificial intelligence in computers? A. multimedia software B. encryption software C. voice recognition
    6·1 answer
  • Reply emailing a student who is asking about audio materials​
    6·2 answers
  • Your company is building a new architecture to support its data-centric business focus. You are responsible for setting up the n
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!