1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marta_Voda [28]
3 years ago
14

Complete the sentences to describe file options categories

Computers and Technology
2 answers:
Radda [10]3 years ago
8 0

Answer:the answer is 100% 1.trust center. 2.general. 3. addins

Explanation:

Anit [1.1K]3 years ago
7 0
Where are the senteces
You might be interested in
A technology called ______
sweet-ann [11.9K]

Answer:

innovative vaccine technologies,I guess~

3 0
3 years ago
Explain why you will do these prarticular things when driving
VashaNatasha [74]
What things?????? Are u talking about
4 0
4 years ago
Which of these is true of blackhat and whitehat hackers?
earnstyle [38]

Answer:

Like all hackers, black hat hackers usually have extensive knowledge about breaking into computer networks and bypassing security protocols. They are also responsible for writing malware, which is a method used to gain access to these systems.

Explanation:

that's all. c:

5 0
3 years ago
Read 2 more answers
Write a program having a concrete subclass that inherits three abstract methods from a superclass. Provide the following three i
hammer [34]

Answer:

C++

Explanation:

using namespace std;

class AbstractClass {

public:  

   virtual bool checkUpperCase(string inputString);

   virtual string lowerToUppercase(string inputString);

   virtual void stringToInt(string inputString);

};

class ConcreteClass: public AbstractClass {

public:

   bool checkUpperCase(string inputString) {

       bool isUpper = false;

       for (int i=0; i < strlen(inputString);  i++) {

           if (isupper(inputString[i])) {

               isUpper = true;

               break;

           }

       return isUpper;

      }

   string lowerToUppercase(string inputString) {

       for (int i=0; i < strlen(inputString);  i++) {

           putchar(toupper(inputString[i]));

       }

       return inputString;

   }

   void stringToInt(string inputString) {

       int convertedInteger = stoi(inputString);

       convertedInteger+=10;

       cout<<convertedInteger<<endl;

   }

};

int main() {

   ConcreteClass cc;

   return 0;

}

3 0
3 years ago
Oday's color display devices represent color using the ______ color model.â
12345 [234]
Mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm
3 0
3 years ago
Other questions:
  • A multistep protocol used to identify and control potential threats to food-safety is the
    8·1 answer
  • When there is flooding and you see pooled water, what should you do?
    13·1 answer
  • Which best describes what Pavel should do differently for the kids book?
    13·2 answers
  • Which of the following is considered a basic task in the context of computer operations? a. Connecting to the Internet b. Natura
    6·1 answer
  • Which of the following statements best represents the impact vaudeville had on the film industry? Early silent films were more r
    14·1 answer
  • What messages do we get about ourselves from rap and hip hop
    7·1 answer
  • Why is it important to ensure that DNS Servers have been secured before implementing an e-mail system
    7·1 answer
  • create a function that draws a certain number of spaces, followed by a certain number of stars, followed by a newline.
    6·1 answer
  • South Africa is the main supplier of which minerals in the world​
    10·2 answers
  • PLEASE HELP ASAP what is the main purpose of electronic speed controller ESC
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!