1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vlada [557]
3 years ago
5

Assume you have written a method with the header num mymethod(string name, string code). the method's type is

Computers and Technology
1 answer:
azamat3 years ago
5 0
I need answer choices
You might be interested in
What are 3 software programs for mobile computing?
Dimas [21]

Answer:

1.Communication Devices

2.Mobile hardware

3.Mobile software and apps

(smartphones, laptop, etc)

3 0
2 years ago
To the following is not a network connection LAM MAN SAN WAN
Sedaia [141]
SAN is not a network connection.

Can I have Brainlest please?
3 0
3 years ago
Wendy is an attacker who recently gained access to a vulnerable web server running Microsoft Windows. What command can she use t
VikaD [51]

Answer:

I would say that if she is connected to the server and has grained access to the server, Wendy would have to use the command shortkey win+r (to run) or she could just use the "Type here to search" function.

Then you can type the words "cmd" to bring up the command prompt

Lastly, she would need to use the protocol scp to transfer files. Wendy might need to include a destination for the files to be directed to.

7 0
2 years ago
Out-of-order instruction execution can cause problems because a later instruction may depend on the results from an earlier inst
scoundrel [369]

Answer:

C

Explanation:

6 0
2 years ago
Why students might want headsets for their computers?
VARVARA [1.3K]
It can be noisy and distracting to students to listen to audio speakers when there are multiple computers in the classroom. Headphones help the students
3 0
3 years ago
Other questions:
  • Match each storyboarding technique with its appropriate description
    9·1 answer
  • An unwanted program that can spread itself to other computers is called what?
    15·2 answers
  • Refer to the exhibit. the gigabit interfaces on both routers have been configured with subinterface numbers that match the vlan
    11·1 answer
  • In an oblique drawing, which lines can be measured accurately, if there is no foreshortening?
    10·1 answer
  • It’s Saturday and you’re looking forward to hanging out with friends and having some fun. However, you get two phone calls early
    10·1 answer
  • What might a designer need to consider when choosing an appropriate energy source for products and power systems
    15·1 answer
  • State the function of the <br> BIOS,​
    11·1 answer
  • 8.6 Code Practice: Question 2
    7·1 answer
  • Define computers software.dicuss the types of computer software​
    5·1 answer
  • Please help me plss! PLS​
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!