1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
d1i1m1o1n [39]
3 years ago
15

1. Which of the following is NOT caused by alcohol?

Computers and Technology
2 answers:
Oksi-84 [34.3K]3 years ago
8 0

Answer:

Explanation:reduced concentratjon

inhibited comprehension

decreased coordination

increased heart rate

Alla [95]3 years ago
7 0

Answer:

What are the choices

You might be interested in
For this assignment, you will create flowchart using Flow gorithm and Pseudocode for the following program example: Hunter Cell
larisa86 [58]

Answer:

The pseudocode is as given below while the flowchart is attached.

Explanation:

The pseudocode is as follows

input customer name, number of texts  

Set Basic bill=5 $;

if the number of texts is less than or equal to 60

Extra Charge=0;

If the number of texts is greater than 60 and less than 200

number of texts b/w 60 and 200 =number of texts-60;

Extra Charge=0.1*(number of texts b/w 60 and 200);

else If the number of texts is greater than 200

number of texts beyond 200 =number of texts-200;

Extra Charge=0.25*(number of texts beyond 200)+0.1*(200-60);

Display Customer Name

Total Bill=Basic bill+Extra Charge;

Total Bill after Tax=Total Bill*1.12;

3 0
3 years ago
Please help meee
AysviL [449]

Answer:

c9

Explanation:

In hex code, the format is # then two pairs to produce the Red, then Green, and lastly Blue.

The hex code follows the same layout as RGB which is Red Green Blue.(#RRGGBB) the maximum value for each color is FF, while the lowest is 00.

Red: #FF0000;

Green: #00FF00;

Blue: #0000FF

White: #FFFFFF;

Black: #000000;

The higher the pair, the more color it has, the smaller the less.

4 0
3 years ago
Write a java program named BMI.java(i)print out your name and your pantherID(ii) Ask user to type in his/her weight and height;
anyanavicka [17]

Answer:

Answered below

Explanation:

//Print name and ID

Scanner x = new Scanner(System.in);

System.out.print("Enter name");

String name = x.nextline();

Scanner y = new Scanner(System.in);

System.out.print("Enter ID");

int id = y.nextline();

System.out.println(name, id);

Scanner w = new Scanner(System.in);

System.out.print("enter weight");

double weight = w.nextline();

Scanner h = new Scanner(System.in);

System.out.print("enter height: ");

double height = h.nextline();

int i = 0;

while( I < 2){

if ( !isDigit(weight) && !isDigit(height){

Scanner w = new Scanner(System.in);

System.out.print("enter weight:);

weight = w.nextline();

Scanner h = new Scanner(System.in);

System.out.print("enter height");

height = h.nextline();

}else{

break;

double BMI = weight / ( height **2)

System.out.print(BMI)}

I++

}

3 0
2 years ago
Which of the following identifiers are valid? Which are Java keywords?
Yuliya22 [10]
Valid
$4 , apps , miles , x

keywrd:
class , int 

7 0
3 years ago
Which of the following was the most widely used personal computer application until the mid 90s
Ulleksa [173]

Answer:

word processing

Explanation:

I just took the test

4 0
2 years ago
Other questions:
  • Name two features that would be useful to potential customers
    13·1 answer
  • Design a method for representing the state of a tic-tac-toe board in computer memory. can you fit your representation into three
    12·2 answers
  • A department manager would like to choose an access control model in which the owner of a resource decides who may modify permis
    8·1 answer
  • A computer interacts with their environment by...
    12·1 answer
  • Create a program that has at least three classes. The class with main. A class that defines a Name (first name, middle name, and
    15·1 answer
  • All states that have altered judicial selection techniques in recent years have adopted some form of:
    5·1 answer
  • For demultiplexing a UDP socket is identified by:_____.
    15·1 answer
  • An example of a(n) ____ reconnaissance attack is a user who sends SQL injections to a system in hopes of generating some type of
    7·2 answers
  • Put these events in the order in which they occurred,
    9·1 answer
  • 5. Why do we need programming language?​
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!