1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
djverab [1.8K]
3 years ago
15

With fan fiction, readers:

Computers and Technology
2 answers:
Wewaii [24]3 years ago
8 0
I would say C) play with words, images, and assiciations.
~Silver
Ronch [10]3 years ago
8 0

It's C:play with words,images,and associations.


You might be interested in
Why must the image be reduced when the field of view is widened to take in more of the scene?
fiasKO [112]
The lighting in the shot
8 0
2 years ago
Read 2 more answers
What is the decimal format of the binary IP address 11001110.00111010.10101010.01000011?
Neporo4naja [7]

Answer:

206.58.170.67 is the decimal format of the given binary IP address.

Explanation:

we can convert the binary number into decimal by the following procedure.

11001110 = 1x2⁷+1x2⁶+0x2⁵+0x2⁴+1x2³+1x2²+1x2¹+0x2⁰

            = 128 + 64 + 0 + 0 + 8 + 4 + 2 + 0

            =   206

00111010 = 0x2⁷+0x2⁶+1x2⁵+ 1x2⁴+1x2³+0x2²+1x2¹+0x2⁰

               = 0 + 0 + 32 + 16 + 8 + 0 + 2 + 0

               = 58

10101010 = 1x2⁷+0x2⁶+1x2⁵+ 0x2⁴+1x2³+0x2²+1x2¹+0x2⁰

              = 128 + 0 + 32 + 0 + 8 + 0 + 2 + 0

              = 170

01000011 =  0x2⁷+ 1x2⁶+ 0x2⁵+ 0x2⁴+ 0x2³+0x2²+1x2¹+1x2⁰

                = 0 + 64 + 0 + 0 + 0 + 0 + 2 + 1

                =  67

so, the IP address is becomes 206.58.170.67

7 0
3 years ago
Assume the Student and Employee classes each extend the Person class. The Student class overrides the getMoney method in the Per
SSSSS [86.1K]

Answer:

Person p1, p2, p3;

int m1, m2, m3;

p1 = new Person();

// assignment 1

m1 = p1.getMoney();

p2 = new Student();

// assignment 2

m2 = p2.getMoney();

p3 = new Employee();

// assignment 3

m3 = p3.getMoney();

//////////////////////////////////////////////////////////////////////////////////////////////

The reference to getMoney in assignment 3 is to the <em>Person</em> class.

Explanation:

Since Employee class didn't override Person class's getMoney() method, calling p3 with getMoney() will call Base class's (Person) getMoney() method.

6 0
3 years ago
1. How does the computer take data and information ?​
aniked [119]

Answer:

Data processing, Manipulation of data by a computer. It includes the conversion of raw data to machine-readable form, flow of data through the CPU and memory to output devices, and formatting or transformation of output. Any use of computers to perform defined operations on data can be included under data processing.  Input devices accept data in a form that the computer can use; they then send the data to the processing unit. The processor, more formally known as the central processing unit (CPU), has the electronic circuitry that manipulates input data into the information people want.

Explanation:

6 0
3 years ago
If the individual accessing the system for disaster recovery purposes were not familiar with the IT system and required system a
Alisiya [41]

Explanation:

Recovery phase is the last phase in any disaster recovery process.

According to the given situation it is better to call System administrator so that the system is recovered properly which even avoids damage of important data stored in the system.

Always it is important to keep credentials for important data or system to avoid unauthorized access. So in the recovery phase, the System administrator would login with the credentials and check for possibility of recovering maximum data out of the system.

4 0
3 years ago
Other questions:
  • When one block is executed after another block in order from top to bottom, this is called ______ (see picture) Question 31 opti
    8·1 answer
  • Lucy has to move data from column A to column N in a worksheet. Which keys should she select to move data in the same worksheet?
    7·2 answers
  • The type of operating system best suited to controlling a massive multiplayer online game is _____.
    15·1 answer
  • When is the bond between the actin and myosin head is broken? when an ATP molecule binds to the myosin head when an ATP molecule
    6·1 answer
  • According to the author, there are five hedging strategies organizations can pursue. One of them is: Select one: a. commit with
    5·1 answer
  • ____ involves taking data from your database and putting it into an electronic file in a format that another external applicatio
    9·1 answer
  • Why is it generally a good idea to set the font size to at least 30 points in presentations?
    6·2 answers
  • Pls say correct guyz pls pls pls
    7·1 answer
  • Primary storage is electronic storage connected directly to the CPU. true or false​
    9·1 answer
  • How to use boolean to check if math answer is correct java
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!