1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
butalik [34]
3 years ago
7

Who listens to bts and whats ur favorite song?

Computers and Technology
2 answers:
Nutka1998 [239]3 years ago
5 0

Answer:

Fake love

Explanation:

Yes, it's a very known one, but the beats and their dance moves are very on point. Plus....they're kinda hot;)

Molodets [167]3 years ago
5 0

Answer:

Shoyo here!

Explanation:

I actually don't listen to BTS... do you have any recommendations?

You might be interested in
Betsy loves her job. On a daily basis she problem-solves and uses her creative side to fix situations centered around setting up
vladimir2022 [97]
 
The answer would be an A/V Specialist, because Betsy is working with technical equipment on a TV set.
6 0
3 years ago
Read 2 more answers
Which of these converts analog audio signals into digital codes in a computer?
DaniilM [7]
It would either be A. Audio card or D. Sound card but most likely A
6 0
3 years ago
Read 2 more answers
A hacker successfully modified the sale price of items purchased through your company's web site. During the investigation that
Korvikt [17]

Answer:

By modifying the hidden form values that is in a local copy of the company web page

Explanation:

In a situation were the hacker successful change the price of the items he/she purchased through the web site of the company's in which the company web server as well as the company Oracle database were not compromised directly which means that the most likely method in which the attacker used to modified the sale price of the items he/she purchased was by modifying the HIDDEN FORM VALUE that was in the local copy of the company web page making it easy for the HIDDEN FORM VALUE to be vulnerable to the hacker because the hidden form value did not store the company server side information or data but only store the company software state information which is why HIDDEN FORM VALUE should not be trusted.

5 0
3 years ago
The computer that process data that are represented in the form of discrete values are called​
Vinvika [58]

Answer:

Digital computer

Explanation:

The computer that process data that are represented in the form of discrete values are called digital computer.

7 0
3 years ago
Read 2 more answers
Write a method max() which take a generic singly linked list as an argument and returns the maximum element reference in the lis
max2010maxim [7]

Answer:

See explaination

Explanation:

java code:

class DONALD

{

static class Node

{

int data;

Node next;

}

static Node head=null;

static int largestElement(Node head)

{

Int max=Integer.MIN_VALUE;

while(head!=null)

{

if(max<head.data)

max=head.data;

head=head.next;

}

return max;

}

static int smallestElement(Node head)

{

int min=Integer.MAX_VALUE;

while(head!=null)

{

if(min>head.data)

min=head.data;

head=head.next;

}

return min;

}

static void push(int data)

{

Node newNode=new Node();

newNode.data= data;

newNode.next=(head);

(head)=newNode;

}

static void printList(Node head)

{

while(head!=null)

{

System.out.println(head.data + " -> ");

head=head.next;

}

System.out.println("NULL");

}

public static void main(String[] args)

push(15);

push(14);

push(13);

push(22);

push(17);

System.out.println("Linked list is : ");

printList(head);

System.out.println("Maximum element in linked list: ");

System.out.println(largestelement(head));

System.out.print("Maximum element in Linked List: " );

System.out.print(smallestElement(head));

}

}

6 0
3 years ago
Other questions:
  • Define lan wan &amp; man
    14·1 answer
  • Abram was asked to explain to one of his coworkers the XOR cipher. He showed his coworker an example of adding two bits, 1 and 1
    7·1 answer
  • Comments can be hidden by clicking the _____ button.
    10·1 answer
  • ____ is the use of networking technology to provide medical information and services.
    14·1 answer
  • What can Strings store
    15·2 answers
  • What is the Slide Sorter View used for?
    12·2 answers
  • Please answer the following essay question:
    13·1 answer
  • 1. How are computers helpful
    11·1 answer
  • Bloxburg Build can anyone help me
    14·2 answers
  • Determine which program you would recommend each of the customers should use. There are multiple correct answers so please inclu
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!