1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anyanavicka [17]
3 years ago
15

80% OF QUESTIONS ARE ANSWERED IN UNDER 10 MINUTES why not mine

Computers and Technology
2 answers:
Lilit [14]3 years ago
6 0

Which question do u need and plus some people just go for quick questions

a_sh-v [17]3 years ago
3 0

This is a homework helping site. If u have a problem with how we attend to our questions please contact one of our operators at the brainly co website, all the information u need is there. And we are sorry about the delay in your questions being answered if u have a question please post it and one of us will be happy to help!

Enjoy Brainly,

Homepage10

You might be interested in
Susan has always wanted to be a veterinarian. When doing her research, she answers all self-assessments geared toward that caree
kherson [118]
She should be researching every component towards a veterinarian
5 0
3 years ago
Which of the following is NOT a type of insurance fraud?
inessss [21]

Answer:

Arson

Explanation:

Because arson is setting something on fire on purpose to cause damage.

The others all are some form or another of insurance fraud.

8 0
3 years ago
Read 2 more answers
Data warehousing and data mining mean the same thing when applied to CRM
Nata [24]
This is false. Data warehousing is storing the data. Data mining is retrieving and analyzing data from the data warehouse.
5 0
3 years ago
Read 2 more answers
Identify the hardware components in your own computer. If you don't have a computer, use a friend's, or one at work or in an NVC
sergij07 [2.7K]

Solution :

A friend of mine have an old version of computer PC having the following components :

Input devices

Model name of the keyboard -- PUNTA , model number -- P-KB515

Model name of the mouse -- PUNTA, model number -- P-KB515

Output devices

Speaker : COMPAQ

Monitor : ACER,  Model Number  --- EB192Q

Storage : 500 MB capacity hard disk

RAM : 2 GB

Processor : Intel Pentium dual E1260 at the rate 1.80 GHz

It is provided with audio jacks

5 0
2 years ago
private members of a class are accessible only from _____________ of the same class or from their friends
maxonik [38]

Answer: Within other member

Explanation:

 The private data member is also known as private function in the computer programming language. The private keyword is basically used to specify the access level and also provide the variable and the methods control to the programmers in the class.

In the class, the variables and the method are directly access by the other methods with the same class but not directly access by the derived class. Therefore, the private members of the class are easily access from the other member of the similar class and also from friends.    

8 0
3 years ago
Other questions:
  • Testing for information would be most likely to occur in which type of engineering?
    5·2 answers
  • What was a result of george washington's belief in the sovereignty of the people instead of monarchy?
    9·1 answer
  • Which command allows d1 to configure an ip address on one of its physical interfaces?
    9·1 answer
  • Where does the list of incoming mail appear in gmail
    13·2 answers
  • The working window of a presentation is the O outline O handout 0 notes o slide​
    5·2 answers
  • The word ____ at the end of several of the member functions in the accompanying class definition specifies that these functions
    10·1 answer
  • A ____ is a share of ownership in a company
    11·2 answers
  • Difine Mainframe Computer~<br><br><br><br><br><br><br><img src="https://tex.z-dn.net/?f=%20%5C%3A%20%20%5C%3A%20" id="TexFormula
    12·2 answers
  • You find a picture of a famous department store online that would be great to include in a project of yours. What should you do
    7·1 answer
  • China sends a computer virus that shuts down telephone service in the United States. In retaliation, the United States hacks int
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!