1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elza [17]
3 years ago
5

Write the definition of a method, dashedline, with one parameter, an int. if the parameter is negative or zero, the method does

nothing. otherwise it prints a complete line terminated by a newline to standard output consisting of dashes (hyphens) with the parameter's value determining the number of dashes. the method returns nothing.
Computers and Technology
1 answer:
Angelina_Jolie [31]3 years ago
7 0
# python 3.x
def dashedline(int n):
    if n > 0:
        print('-' * n)


If you wanted a different language, you should make sure to specify that in your question.
You might be interested in
ASAP PLS I DON T HAVE ENOUGH TIME
velikii [3]

Answer:

The font-style property allows you to make text appear italicized (i.e. sloped, or slanted).

em {

 font-style: italic;

}

Explanation:

This property accepts one of three possible values: normal, italic, and oblique.

If a given font family has an italic or oblique face embedded, the browser will select that face. If no italic or oblique face is available, the browser will mimic the sloping effect. If italic is defined and there is no italic face available, the browser will look for an oblique face before it tries to mimic the italic. The same applies to oblique; it too will look first for an italic face.

To prevent the browser from adding a mimicked, or synthesized, version of the italic or oblique face, you may use the font-synthesis property (if supported).

8 0
2 years ago
A desktop computer (named workstation22) can’t connect to the network. A network card was purchased without documentation or dri
Lelechka [254]

Answer:

<em>The first step is to download the driver file from the Internet using  another Computer system, Copy the driver to a flash or CD then run the installation file on the Desktop Computer.</em>

Explanation:

<em>Driver files can be easily gotten from software sites online or from other secure websites, most times you have to pay for these driver files in some sites for secure and authentic download.</em>

<em>it is very necessary  that the user takes note of the exact system name, model and system architecture with respect to when downloading the driver file.</em>

4 0
4 years ago
Steps to run a Q-BASIC programme<br>​
jarptica [38.1K]

Answer:

Cls

Read

Input

Print

END

5 0
3 years ago
A___________is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its
Molodets [167]

Answer: rootkit

Explanation:

Hi, A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.

A rootkit provides continued privileged access to a computer while hiding its presence. Because of this hiding characteristic it is very difficult to detect.

Once a rootkit has been installed, it allows someone to have total remote control of a computer and do things such as files executions and system changes.

4 0
3 years ago
2h2 + o2 → 2h2o<br> pls i need help
Irina18 [472]

Answer:

in this reaction, the ON of Oxygen on H2O is 1 and the oxidation number of Hydrogen is +1, and of oxygen is -2. So oxygen goes through reduction, and hydrogen goes through oxidation.  Hence this is a redox reaction. And energy is released during the process. All this fact make this quite complicated reaction. Also, see the covalent bonds are broken, and a new covalent bond is being formed,  

Explanation:

The answer is self explanatory.

7 0
4 years ago
Other questions:
  • SOMEONE PLEASE HELP ASAP!!
    14·2 answers
  • In the Dread Pirate Roberts case, U.S. Ulbricht, 31 F. Supp. 3D 54D (S.D.N.Y. 2014), one of the issues that the court addressed
    10·1 answer
  • CRM software programs are designed to help companies gather all customer contact information into multiple data management progr
    13·1 answer
  • Use the Windows ________ to check on a nonresponsive program. Select one: A. Backup utility B. Task Manager C. System Restore D.
    10·1 answer
  • 4) Short answer questions<br>c) What is Cyber Law?​
    7·1 answer
  • g Given the information below, answer each part of the question: Page Size: 4 KB a. How many bits are in the Page Offset
    11·1 answer
  • In excel online what is it called when you join connecting cells together to span across more than one column and/or row?
    7·2 answers
  • what is the term for software that is exclusively controlled by a company, and cannot be used or modified without permission?
    6·1 answer
  • How many binary digits are in 10^100.
    13·1 answer
  • 1. It manages the computer's memory and processes, as well as all of its software and hardware.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!