1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vlada [557]
3 years ago
5

Assume you have written a method with the header num mymethod(string name, string code). the method's type is

Computers and Technology
1 answer:
azamat3 years ago
5 0
I need answer choices
You might be interested in
Name at least 3 different portable computer devices that can be purchased
rosijanka [135]

Answer:

Smart Phone

Cameras

Console Controller

Brainliest and please say if its right!!

3 0
3 years ago
Read 2 more answers
An incident response plan should be created be for a software system is released for use.
Nat2105 [25]
The answer is choice “a. True”.
8 0
2 years ago
Question 1
Alexxandr [17]

Explanation:

so, what do you think ?

I am sure you have used a computer or a smart phone yourself.

how many clicks or taps do you want to do before you you get what you were looking for ?

hmmmm ?

as few a possible, right ?

ideally, of course, this is one (1) click or tap.

7 0
3 years ago
Can file extension txt be used in other os
rodikova [14]
Yes, a text file with a .txt extension can be read by Linux/Unix/Mac as they are ASCII unformatted.
6 0
3 years ago
In order to view the permissions assigned to each type of user for all the files located in a directory, which of the following
Rufina [12.5K]

The correct answer is B: ls -l.

Further Explanation:

In Linux there is a specific command needed to look at the files in a directory. In addition to using the command ls -l, you will need to use < > after the command and insert the name of the file that is being looked for. For example: ls -l <root root 2356 0600 Oct 22 lanyard>.

Each word and character has their own meaning and access information stored in the database. This will also show the users accesses permission to see the file and if needed to write over the file.

Learn more about computer commands at brainly.com/question/13338803

#LearnwithBrainly

5 0
3 years ago
Other questions:
  • The second stage of digestion takes place in the small intestine. <br> True Or False?
    8·1 answer
  • What natural resources fueled industrialization in the united states?
    14·1 answer
  • A flat-panel detector is exposed with nothing between the x-ray tube and detector. 5 images were acquired on 5 different days us
    6·1 answer
  • Match the personality traits with their description
    9·2 answers
  • An indention where the first line of text is indented and the second and succeeding lines start at the left margin is called ___
    8·1 answer
  • Discuss the differences between a quantitative and qualitative risk analysis. Please write two paragraphs.
    8·1 answer
  • What is conference proceeding​
    10·2 answers
  • Assign the size of userInput to stringSize. Ex: if userInput is "Hello", output is: Size of userInput: 5
    7·1 answer
  • Stay at least _____ behind the vehicle ahead of you at all times.
    12·2 answers
  • what is the name of the program that enables the device and operating system to communicate with each other?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!