1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gayaneshka [121]
3 years ago
15

Which of these is not a modifier? short unsigned nest long

Computers and Technology
1 answer:
laila [671]3 years ago
4 0
A modifier is another example of a noun so in that case the answer would be “nest” nest could be used for a verb when someone nests can mean many possibilities so that would be the only opening spot for it.


Hope this helps!!
You might be interested in
A constructor is just a special type of ______________ that instantiates an object from the class.
Dmitry_Shevchenko [17]

A constructor exists just a special type of subroutine that instantiates an object from the class.

<h3>What  is constructor?</h3>

A constructor exists as a special kind of subroutine in a class. It maintains the same name as the name of the class, and it has no return type, not even void. A constructor exists called with the new operator in order to create a new object.

A constructor exists as a special process of a class or structure in object-oriented programming that initializes a newly constructed object of that type. Whenever an object exists created, the constructor is called automatically. A constructor in Java exists as a special method that is utilized to initialize objects. The constructor exists called when an object of a class is created.

A subroutine exists as a sequence of program instructions that serves a specific task, packaged as a unit. This unit can then be utilized in programs wherever that separate task should be performed.

Hence,  A constructor exists just a special type of subroutine that instantiates an object from the class.

To learn more about constructor refer to:

brainly.com/question/13267121

#SPJ4

8 0
1 year ago
charles, a security analyst, needs to check his network for vulnerabilities. he wants a scan that interacts with network nodes a
finlep [7]

Charles, a security analyst, needs to check his network for vulnerabilities. he wants a scan that interacts with network nodes and repairs security issues found. The kind of scanning that best describes Charles's requirements is: Active scanning.

<h3>Who is a Security Analyst?</h3>

A Security Analyst's responsibilities include the following:

Define, plan, execute, maintain, and improve security measures, policies, and controls. Writing reports and offering insights on the effectiveness of current security policies, incident response plans, disaster recovery plans, and other security-related information

Active scanning is a scanning approach that involves scanning individual endpoints in an IT network in order to retrieve more specific information.

Learn more about Security Analysts:
brainly.com/question/16354463
#SPJ1

6 0
1 year ago
You create a database that stores data in tables that consist of rows and columns. each row has a primary key, and each column h
jeyben [28]
The answer is a relational database.

A data model in database management system consists of rules that define how the DB organizes data. Today, a relational database is widely used. It is a collection of data items organized as a set of formally described tables from which data can be accessed in many different ways.



3 0
3 years ago
Read 2 more answers
What is that black thing on my wall?
Darya [45]
I'm guessing your television if it's a flat screen
7 0
3 years ago
You manage 20 windows workstations in your domain network you want to prevent the sales team members from making system changes
Rainbow [258]

Answer:

You should configure the user account control.

Explanation:

Behavior of the elevation prompt for standard users setting in Group Policy to Prompt for credentials.

4 0
3 years ago
Other questions:
  • The syntax for multiplication function is ____________.
    8·1 answer
  • Do the pros of interpersonal communication via social media outweigh the cons? Explain.
    9·2 answers
  • Computer program allowing the computer to communicate<br> with a hardware device
    13·1 answer
  • What is the quickest option for adding internet images to a power point presentation
    7·1 answer
  • Look at the data set below. {9, 12, 12, 15, 18, 20, 25} in this data set, what is the median
    5·2 answers
  • Which of the following contributes to your active digital footprint
    12·2 answers
  • What technology has a function of using trusted third-party protocols to issue credentials that are accepted as an authoritative
    12·1 answer
  • Imagine a typical website that works as a storefront for a business, allowing customers to browse goods online, place orders, re
    13·1 answer
  • Identify a statement that accurately differentiates between short-term memory and working memory.
    15·1 answer
  • What is boot sector virus​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!