1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Katena32 [7]
4 years ago
13

Select the correct answer. Which character type is usually seen more often in games for young children than for the other age gr

oups? A. fantasy B. animal C. historical D. mythic
Computers and Technology
1 answer:
garri49 [273]4 years ago
7 0

Answer:

B. Animal

Explanation:

Just took the test on Plato

#PlatoLivesMatter

You might be interested in
Which components exist in the contextual tab for tables called Design? Check all that apply. Table Styles Export Table Data Prop
EastWind [94]

Answer: table styles, properties, tools, external table data, table style options

Explanation: i took the assignment

4 0
3 years ago
Read 2 more answers
What do you find when you first open a word processor and how do you adjust the document Indentitions
Ilia_Sergeevich [38]

When you first open a word processor document you will find a document with the default indents and margins.

In order to adjust the document indentations the easiest way to do this is to place the cursor where you want the indent to be and then adjust the indent arrow on the ruler at the top of the document to the appropriate value.

7 0
3 years ago
How do I add and accept a friend on this app?
lesya692 [45]

Answer:

you press the person icon and they get invatation and they accept or they dont

Explanation:

7 0
3 years ago
A company has two geographically separate locations that need to connect using a VPN. Which of the following devices must be spe
victus00 [196]

Answer:

The correct answer to the following question will be Option A (Firewall).

Explanation:

  • A network or information system of safety that relies on predetermined security rules that monitors and commands outbound traffic of network or it will be configured specifically to allow VPN to enter the network
  • This usually creates a firewall between a trustworthy internal network, such as the Internet, and the untrustworthy outside network.

The other solutions like B, C and D are not capable of allowing VPN to traffic to a network. Therefore, the correct answer is Option A.

3 0
4 years ago
In this exercise you will debug the code which has been provided in the starter file. The code is intended to do the following:
abruzzese [7]

Answer:

The corrected code is as follows:

import java.util.Scanner;

public class U2_L4_Activity_Two{

public static void main(String[] args){

Scanner scan = new Scanner(System.in);

String str1 = scan.nextLine();

String str2 = str1;

str1 = str1.toUpperCase();

System.out.println(str1);

System.out.println(str2);

}

}

Explanation:

This corrects the scanner object

Scanner scan = new Scanner(System.in);

This line is correct

String str1 = scan.nextLine();

This copies str1 to str2

String str2 = str1;

This converts str1 to upper case

str1 = str1.toUpperCase();

This prints str1

System.out.println(str1);

This prints str2

System.out.println(str2);

8 0
3 years ago
Other questions:
  • 1. Jesse wants a recommendation about creating an SCR help desk. She said that I can find lots of information about help desks o
    7·1 answer
  • A ________ is a system of hardware and software that stores user data in many different geographical locations and makes that da
    14·1 answer
  • Earthquakes with magnitudes between 1.0 and 2.9 on the Richter scale are
    11·1 answer
  • Which relationship is possible when two tables share the same primary key? one-to-one one-to-many many-to-one many-to-many
    15·2 answers
  • You modify a document that is saved on your computer. Where are the changes stored until you save the document?a. Radom access m
    15·1 answer
  • Data aggregate functions
    6·1 answer
  • Two threads try to acquire the same resource at the same time and both are blocked. Then, they continually change their states i
    14·1 answer
  • Which of the following is the best definition of a computer code? a secret language a mathematical language a language that comp
    10·2 answers
  • If you give an actual answer I'll give brainliest​
    13·2 answers
  • Creating a Numpy Array
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!