1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Luden [163]
3 years ago
9

The ___ are documents which uses http ?

Computers and Technology
1 answer:
givi [52]3 years ago
5 0
The HTML is the answer
You might be interested in
Which event represents an example of social media being used in an
Semmy [17]
Hello!

The answer is:
-D. Communication with friends and family after other systems were disabled by a major earthquake.

I hope this helps you! :)
7 0
2 years ago
Write a function that accepts an int array and the array’s size as arguments. 1. The function should create a new array that is
Contact [7]

Answer:

The question seems to be incomplete. Analyzing the full question the answer has been explained below. Please let me know if your answer requirement was other than this.

Explanation:

#include<iostream>

#include<fstream>

using namespace std;

int *extend(int arr[], int N)

{

  // create a new array that is twice

  //the size of the argument array.

  int *new_arr = new int[2 * N];

  int i;

  // copy the contents of the argument

  //array to the new array

  for (i = 0; i < N; i++)

      new_arr[i] = arr[i];

  // initialize the unused elements

  //of the second array with 0

  for (i = N; i < 2 * N; i++)

      new_arr[i] = 0;

  // return a pointer to the new array

  return new_arr;

}

//main function

int main()

{

  // Declare the array

  int N;

  //Prompt and reads an integer N

  cout << "Enter N : ";

  cin >> N;

  // If the integer read in from

  //standard input exceeds 50 or is less than 0

  if (N < 0 || N > 50)

      // The program terminates silently

      exit(0);

  // open file in read mode

  ifstream in("data.txt");

  // create an array of size N

  int *arr = new int[N];

  int i;

  // reads N integers from a file

  //named data into an array

  for (i = 0; i < N; i++)

  {

      // read integer from file

      in >> arr[i];

  }

  //then passes the array to your

  //array expander function

  int *new_arr = extend(arr, N);

  // print the extended array

  for (i = 0; i < 2 * N; i++)

      cout << new_arr[i] << endl;

  in.close();

  return 0;

}

4 0
3 years ago
The command to compile a class in the file test.java is ______________.
Sliva [168]
Javac test

Windows may require an absolute path for javac.
8 0
3 years ago
Which definition of intelligence is based on the Turing test?
Kitty [74]

Answer:

The Turing Test is a deceptively simple method of determining whether a machine can demonstrate human intelligence

Explanation:

8 0
3 years ago
Which of the following is a good question to ask during an informational interview?
grin007 [14]
How do you know your information is valid?
8 0
3 years ago
Read 2 more answers
Other questions:
  • Describe a situation where it would be appropriate to use each of the six leadership styles described by Daniel Goleman
    7·1 answer
  • Find every number from 1 to n (inclusive) that is a palindrome which starts with the digit 3. Do not user a helper function.
    10·1 answer
  • Information gathered from observing a plant grow 3 cm over a two-week period results in _______.a. inferences. b. variables. c.
    11·1 answer
  • There are 10 red apples and 12 green apples in a basket. If Vinta randomly selects 3 apples from the basket, what is the probabi
    15·1 answer
  • When is the bond between the actin and myosin head is broken? when an ATP molecule binds to the myosin head when an ATP molecule
    6·1 answer
  • Write a program that reads a file containing text. Read each line and send it to the output file, preceded by line numbers. If t
    8·1 answer
  • 25 points!!!!!!!!!!!!!!!!!!!!!
    9·2 answers
  • What adaptation Judy and her parents have that help them run from predators coming?​
    6·1 answer
  • A vending machine that serves coffee pours a varying
    10·1 answer
  • An attacker obtains a connection to your LAN and then uses SETH to perform a MiTM attack between your system and the company RDP
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!