1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marishachu [46]
3 years ago
14

Soo...My Old 3DS XL haven't been touched in around a year...So i tried to charge it but no LED lights opened..Even the power but

ton does not work..I need Halp!
Computers and Technology
1 answer:
Firlakuza [10]3 years ago
5 0

Try charging overnight, otherwise it is most likely broken. Hope you get a new 3DS, although the Nintendo Switch is also a great console to consider!

You might be interested in
Write one line Linux command that performs the required action in each of the problems given below: (a) Find the difference in t
Luda [366]
You have to add the integer
8 0
2 years ago
The most commonly used network topology where network endpoints connect to a central device is called
arsen [322]
That would be a star network. A star network isn't necessarily shaped like a star, of course, but like you mention this topology has a central device, usually a server of some sorts, and then many different endpoints coming out of that central device, such as the client computers for the server.
6 0
3 years ago
As we think of computer crime, there are ways in which thieves can steal your banking information through ATM machines. If you w
Travka [436]

Answer:NO, I WILL NOT GIVE THE TELEPHONE NUMBER

WHY?

IT IS A BREACH OF TRUST

IT IS A BREACH OF DATA PRIVACY

IT ALSO VIOLATES THE PRIVACY OF INFORMATION RIGHT OF THE GIRL.

Explanation:BREACH OF TRUST is act or actions taken against the signed agreement between a person and another party which may be any Organisation like a Financial Institution where the Financial Institution agrees not to release the personal Information about their customer without the person's consent.

IT IS A BREACH OF DATA PRIVACY many persons wants their data which are made available to Organisation to be kept private,divulging such information without the person's consent is a reach of data privacy.

It violates the privacy of Information right of the Girl, except for Security or other specified reasons no Organisations or person is given the right to divulge another person's right to a third party, ALL THESE VIOLATIONS ARE PUNISHABLE UNDER THE LAWS OF THE LAND.

4 0
3 years ago
Given the following declaration of a field in a class: public static final String GREETING = "Hi";
FromTheMoon [43]

Answer:

Each object of this class has its own copy of GREETING

Explanation:

option c: Each object of this class has it’s own copy of GREETING

This is the only false statement.  When a variable is preceded by the Static key word only one copy of that variable is created, no matter the amount of object created from the instance of that class.

option a: Each object of this class can access GREETING, this is true.

option b: The value of GREETING can’t be changed in any methods, this is true because GREETING is preceded by the keyword final.

option d: GREETING.length() = 2, this is true because the method length() is use to get the length of the string "Hi" which is 2.

option e: GREETING.toUpperCase() = "HI", this is also true because the method toUpperCase()  convert all the character of "Hi" to uppercase.

Note: All these are peculiar to java programming language.

8 0
3 years ago
Draw the following diagrams to represent the information system chosen in assignment 1 Context diagram The context diagram is ex
larisa86 [58]

An example of Context diagram that shows the Relevant system name and External Entities Input and output data flows is given in the image attached.

<h3>What is context diagram?</h3>

Context diagrams is known to be a depiction that is based on how external entities work together with a given system.

Note that it is said to be one of the most basic form of a data flow as it depicts a novel set of activities and also functions.

Therefore, An example of Context diagram that shows the Relevant system name and External Entities Input and output data flows is given in the image attached.

Learn more about  Context diagram from

brainly.com/question/12972996

#SPJ6

8 0
1 year ago
Read 2 more answers
Other questions:
  • An unwanted 'explosion' of inbox messages is called​
    8·2 answers
  • Explain how it is possible for a sequence of packets transmitted through a wide area network to arrive at their destination in a
    14·1 answer
  • Which type of market are you in if your firm, along with three other firms, controls 95% of the total music industry?
    13·1 answer
  • What is the output of the following program when the method is called with 4?
    11·1 answer
  • While speech recognition can operate without any confi guration, you can train it to more accurately recognize your voice. true
    5·1 answer
  • Why is the ketboard calledQWERTY
    11·2 answers
  • For each of the following application areas state whether or not the tree data structure appears to be a good fit for use as a s
    8·1 answer
  • The Scientific Method is a/an
    9·2 answers
  • How can you make a search phrase more effective?
    11·1 answer
  • What is the half of 3/18
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!