1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lara [203]
3 years ago
11

The laws governing search and seizure in the public sector are much more straightforward than those in the private sector. TRUE

or FALSE
Computers and Technology
1 answer:
Lapatulllka [165]3 years ago
7 0

Answer:

True

Explanation:

Because of the contract that you have agreed to when joining the work force. Which is different from the private sector.

You might be interested in
Direction. See
storchak [24]

Answer:

1.A

2.A

3.B

4.A

5.D

6.A

..............

8 0
3 years ago
What are storage devices? write two such devices​
Ira Lisetskai [31]

Answer:

two types of storage devices used with computers a primary storage device such as r a m and the secondary storage device such as a hard drive secondary storage can be removable internet or external

Explanation:

hope it is helpful for you please make me brilliant only if you like this answers

8 0
2 years ago
Read 2 more answers
This program needs to be written in Java. Along with NO For/while loops, and no methods.
Umnica [9.8K]
The only way without a while loop and no method I can think of is use switch with every possible variation of the four digit binary which is 15.

Here is the starter code:

import java.util.Scanner;
public class MyClass {
public static void main(String args[]) {
Scanner sc = new Scanner(System.in);
int digit = sc.nextInt();
switch(digit) {
case 0000:
System.out.println("0");
break;
case 0001:
System.out.println("1");
break;
case 0010:
System.out.println("2");
break;
case 0011:
System.out.println("3");
break;
case 0100:
System.out.println("4");
break;

… (fill in other cases)


}
}
}

Use this link: https://www.electronics-tutorials.ws/binary/bin_3.html

There might be a better way, but without loops or methods this is all I got.
6 0
2 years ago
Which one of the following is considered a peripheral? A Software B Mouse C USB connector D Motherboard
Bogdan [553]

A mouse is considered that out of the options listed.

5 0
3 years ago
Read 2 more answers
The ability to write functions is one of the more powerful capabilities in C++. Functions allow code to be reused, and provides
Lunna [17]

Answer:

The header file in C++ is as follows

myFunction.h

void max(int a, int b)

{

if(a>b)

{

 std::cout<<a;

}

else

{

 std::cout<<b;

}

<em>}</em>

The Driver Program is as follows:

#include<iostream>

#include<myFunction.h>

<em>using namespace std;  </em>

int main()

{

int m,n;

cin>>m;

cin>>n;

max(m,n);

<em>}</em>

Explanation:

It should be noted that, for this program to work without errors, the header file (myFunction.h) has to be saved in the include directory of the C++ IDE software you are using.

For instance; To answer this question I used DevC++

So, the first thing I did after coding myFunction.h is to save this file in the following directory  ..\Dev-Cpp\MinGW64\x86_64-w64-mingw32\include\

Back to the code

myFunction.h

void max(int a, int b)  {

-> This prototype is intialized with integer variables a and b

if(a>b)  -> If the value of a is greater than b;

{

 std::cout<<a;  -> then the value of variable a will be printed

}

else

-> if otherwise,

{

 std::cout<<b;

-> The value of b will be printed

}

}

Driver File (The .cpp file)

#include<iostream>

#include<myFunction.h>  -> This line includes the uesr defined header

using namespace std;  

int main()

{

int m,n;  -> Two integer variables are declared

      cin>>m;  -> This line accepts first integer input

      cin>>n;  -> This line accepts second integer input

max(m,n);

-> This line calls user defined function to return the largest of the two integer variables

}

6 0
3 years ago
Other questions:
  • Determine the exact output of the code:
    13·1 answer
  • The columns of a spreadsheet data source are A. form letters. B. the mailing list. C. data points. D. fields.
    12·1 answer
  • Some technologies like vertical farming have a number of negative effects. Which is a negative outcome of this technology? A. In
    10·1 answer
  • Which describes the third step in visual character development
    9·2 answers
  • Write a program that lets the user play the game of Rock, Paper, Scissors against the computer. The program should work as follo
    5·1 answer
  • Going to Grad School! In the College of Computing and Software Engineering, we have an option for students to "FastTrack" their
    11·1 answer
  • What are seven main internal parts of a computer
    7·2 answers
  • Making the data impossible to recover even by applying physical forensics methods is known as __________ of media.
    13·1 answer
  • Union Carbide accident safety policies and procedures were not followed was due to
    14·1 answer
  • CAN SOMEONE PLEASE DO THESE FOR ME I WILL GIVE BRAINLIESR AND 20 POINTS PLEASE ITS ONLY 5 QUESTIONS PLEASEEEE
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!