1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
miss Akunina [59]
3 years ago
7

A collision volume is called ____

Computers and Technology
1 answer:
Phoenix [80]3 years ago
6 0

C IS THE CORRECT ANSWER NOT A I PROMISE ITS REGION!!!

You might be interested in
Consider the following code segment, where num is an integer variable.int[][] arr = {{11, 13, 14 ,15},{12, 18, 17, 26},{13, 21,
Setler79 [48]

Answer:

c. 16 17

Explanation:

Given

num = 14

The above code segment

Required

The output

In the code segment, we have the following iterations:

for (int j = 0; j < arr.length; j++) and for (int k = 0; k < arr[0].length; k++)

The above iterates through all the elements of the array.

The if condition is true, only on two occasions

(i) When i = 0; j = 2

(ii) When i = 3; j = 0

i.e.

arr[0][2] = 14

arr[3[0] = 14

So, the result of the print statement is: j + k + arr[j][k]

(i) When i = 0; j = 2

j + k + arr[j][k]  = 0 + 2 + 14 = 16

(ii) When i = 3; j = 0

j + k + arr[j][k]  = 3 + 0 + 14 = 17

<em>Hence, (c) 16 17 is true</em>

6 0
3 years ago
Richard is shopping online and has to enter a password to access his bank account. Which method attribute will securely submit h
kotykmax [81]

Answer:

password

Explanation:

It is certainly the password method attribute, and this can enable Richard to securely submit the credentials. If we set the method attribute or input type as a password, then the password is sent in the encrypted form, and it remains secure. And hence, the password cannot be copied by anybody, and it remains safe. This is the characteristic of a secure web form. And remember we are dealing with an HTML form.

6 0
3 years ago
Read 2 more answers
What are the advantages of using a folder?​
Fofino [41]

Answer:

1. easy access to files

2. better organization

Explanation:

8 0
3 years ago
A _____ is a collection of binary digits, including message data and control characters for formatting and transmitting, sent fr
Keith_Richards [23]

Answer:

Packet

Explanation:

8 0
3 years ago
What is the most important basic property of melody? Why?​
enot [183]

Most good melodies restrict their basic range to no more than an octave-and-a-half. Most good melodies use repeating elements. Listeners should be hearing certain melodic intervals, rhythms and other musical shapes repeating throughout the melody

5 0
3 years ago
Other questions:
  • A user would like to format an arrow that has been inserted into a chart. What is the most efficient method for completing this
    9·1 answer
  • To get revenge on the pizza parlor burning his pizza and not reimbursing him for it, David returned to the pizza parlor after-ho
    9·2 answers
  • Daniella mailed a package to her brother three days ago. She wants to see if it has arrived yet. What technology will enable her
    10·2 answers
  • The GPS device in an automobile uses which communication channel?
    7·1 answer
  • All computer systems have
    14·2 answers
  • Which of the following statements is NOT true regarding the Security Configuration and Analysis (SCA) tool?
    12·1 answer
  • A constructor can be overloaded with more than one function which has the same name but with what two different things
    7·1 answer
  • To view a friend's calendar, you must request access.<br> A) True<br> B) False
    10·2 answers
  • The author mentions several challenges facing the world, including poverty and climate change. How might big data help us solve
    14·2 answers
  • In a ________ system configuration, separate information systems are designed and managed by each foreign unit.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!