1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SVEN [57.7K]
3 years ago
15

Which code fragment constructs an arrray list named players that is initialized to contain the strings "player 1" and "player 2"

?
Computers and Technology
1 answer:
Lyrx [107]3 years ago
7 0
The code used to construct an array of player names is a variable
You might be interested in
Refers to the capacity to form bonds with particular
elena-s [515]
The answer is letter b
8 0
3 years ago
Read 2 more answers
What are two major techniques involved in green computing
julia-pushkina [17]

Answer

sales and consulting

Explanation

Green computing the use of computers and resources  in an environmental friendly way. This  is for the purpose of reducing the use of hazardous materials and also to maximize energy efficiency during the time the product will remain in use.  And also to promote recycling of those products after their life is over. This is very beneficial to the environment because it reduces environmental impact.

4 0
3 years ago
Which Command Prompt commands in Windows is used for listing a computer connections to shared resources
olganol [36]

Answer:

H=-17:927+79#8=8-_82”w

Explanation:

18:80:@=&’:(@0:*

4 0
3 years ago
How to eject a flash drive from chromebook?
Dmitrij [34]
Go to the files app, and there should be an eject symbol next to the flash drive
8 0
3 years ago
Computers that belong to the same domain can access a common security database of user and computer account information. This ty
Mashutka [201]

Answer: Active Directory database

Explanation:Active directory database works on ESE (Extensible storage engine) for the functioning.Indexed and sequential access method(ISAM)database persist in the ESE for the management of computer devices.

This functions for providing the quick accessing towards the records through database.The database files contain the data in the ESE indexes and is common to computer information and the user.

6 0
3 years ago
Other questions:
  • How do you design video games
    5·1 answer
  • When a range of IP addresses is set aside for client devices, and one of these IPs is issued to these devices when they request
    14·1 answer
  • In the file MajorSalary, data have been collected from 111 College of Business graduates on their monthly starting salaries. The
    15·1 answer
  • What is the simplest way to permanently get rid of a unwanted file
    12·1 answer
  • Select a classification for File2 so that: Alice can read and write to File2 Bob and Charlie can write to File2, but can't read
    6·1 answer
  • Which device can be installed on the edge of your network to allow multiple remote users to connect securely to your internal en
    9·1 answer
  • Show the stack with all activation record instances, including static and dynamic chains, when execution reaches position 1 in t
    6·1 answer
  • HELP ME!! <br> it’s a cross word, but I don’t know the answers, 25 points
    12·1 answer
  • 2.13) A simple rule to estimate your ideal body weight is to allow 110 pounds for the first 5 feet of height and 5 pounds for ea
    15·1 answer
  • How did the ENIAC change computing?<br> how did the eniac change computing
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!