1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sedbober [7]
4 years ago
14

Help brainliest awnser

Computers and Technology
1 answer:
Kipish [7]4 years ago
6 0

I am sure that both of those are right. I took technology classes all throughout middle school, and now I am in high school so.. I think, personally, that they are correct. Though, the last one might be B, considering they would have to type in the letters to make it appear. I am not 100% sure, but I definitely remember learning about this. Hope I helped! If I got it wrong, then at least I tried!

You might be interested in
Assuming that a user enters 5 as the age, what is the output of the following code snippet? int age = 0; Scanner in = new Scanne
trapecia [35]
Kid
YoungAgedOld

It will print out this way because the code uses if statements, rather than else if statements. As written, every single if statement will be triggered because each expression will evaluate to true. If there were else statements involved, then only the first one that is triggered will print out, and the rest will be ignored.

The reason for the weird formatting/spacing is because only the first print statement is println which adds a new line after printing. The other statements are just print, which does not add a new line or a space.
7 0
3 years ago
If the transmitting device would like for the receiving device to push currently buffered data to the application on the receivi
Andreyy89

Answer:

The right approach will be "PSH".

Explanation:

  • The PSH flag seems to be an acceptable solution through TCP which always encourages the submit implementation to immediately transfer data but only whenever the buffer isn't complete.
  • The implementation helps to formulate this same flag towards true for something like the connection, as well as TCP will instantly begin transmitting the relevant information.
3 0
3 years ago
You want to design a small portable computer system with memory that can be updated, but that does not lose its contents when th
garri49 [273]

Answer:

CMOS

Explanation:

CMOS stands for complementary metal oxide semiconductor.  CMOS is in the design of several types of semiconductors. in most computers there are CMOS that are powered by the PC's batteries to save the memory state of  date, time, and system setup parameters when the PC looses power. In the question above, given the specified parameters for the new system, a CMOS chip will serve perfectly

7 0
3 years ago
What is the system of computers, routers, wires, cables,etc. that allow computers to communicate called?
Anika [276]
Internet maybe?
Not 100% sure though
5 0
3 years ago
When using overloaded functions in appication code, the compiler will call which one
musickatia [10]

Answer:

The function with same name,same number and type of arguments.

Explanation:

Function overloading occurs when the functions with same name in the same scope with the same return type but different argument numbers and different argument types.So when we want to call a specific function we have to pass the same number of arguments with same type of arguments.We can do function overloading for the functions with same return type only.

7 0
4 years ago
Other questions:
  • Write a SELECT statement that returns an XML document that contains all of the invoices in the Invoices table that have more tha
    8·1 answer
  • If everyone's choice for their computer printer were an hp laserjet 4100, there would be a ___ preference segment in the compute
    8·1 answer
  • Items in the __________ area of a class are accessible to all entities that can "see" the object(s) of that class type
    10·1 answer
  • A photo's color intensity can be modified by changing the brightness and content.
    9·1 answer
  • The at command is used to _______________.
    15·1 answer
  • The degree to which a firewall can impose user access restrictions is known as which of the following?Security assurancePrivileg
    8·1 answer
  • The variable named var2 declared above will include an ending NULL character.
    9·1 answer
  • The design of a blog refers to:
    8·1 answer
  • Select all steps in the list below that should be completed when using the problem-solving process discussed in this chapter.
    14·1 answer
  • Microsoft® Publisher does which of the following?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!