1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VMariaS [17]
3 years ago
8

A typical self-expelling fire extinguisher empties its contents in

Computers and Technology
1 answer:
attashe74 [19]3 years ago
3 0
This will be done in about 12-60 seconds! =)
You might be interested in
Write a method named printGPA that takes in as a parameter a Scanner to read in user input, and calculates a student's grade poi
KatRina [158]

import java.util.Scanner;

public class JavaApplication40 {

   public static  void printGPA(Scanner scan){

       System.out.println("Enter a student name:");

       String name = scan.nextLine();

       System.out.println("Enter the number of courses:");

       int courses = scan.nextInt();

       double total = 0;

       for (int i = 1; i <= courses; i++){

           System.out.println("Course "+i+" Grade:");

           double grade = scan.nextDouble();

           total += grade;

       }

       System.out.println(name+"'s grade is "+(total/courses));

   }

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       printGPA(scan);

   }

   

}

I hope this helps!

5 0
3 years ago
Jeff is preparing for a presentation on effective communication skills. He has to face an audience of over 50 people. Which stra
Georgia [21]
C. accept the mistake and move on
6 0
3 years ago
Read 2 more answers
Which destination ip address is used when an ipv6 host sends a dhcpv6 solicit message to locate a dhcpv6 server?
Dvinal [7]
Ff02::1:2


---------------------------
7 0
4 years ago
When you select Insert and click on a shape the mouse pointer turns into a/an
Gennadij [26K]

It turns into crosshairs

6 0
3 years ago
Read 2 more answers
Consider the following code segment. How many unique new (do not count the starting process) processes are created? (you may wan
valkas [14]

The number of unique processes that are created is in the original process, you get the PID of the child process. In the child process, you get 0.

<h3>What is a Code Segment?</h3>

This refers to the portion of an object file that is in the virtual space of a computer that contains executable instructions.

Hence, we can note that since PID >= 0, then there would be the creation of two identical processes in which the original process returns the PID of the child process, and the output in the child process would be zero.

If we make use of a canonical tag,

p = fork();\\if (0 == p)

{

   // We're the child process

}

else if (p > 0)

{

   // We're the parent process

}

else

{

   // We're the parent process, but the child couldn't be created

}

Read more about code segments here:

brainly.com/question/25781514

#SPJ1

3 0
3 years ago
Other questions:
  • When you buy a trackphone, do you have to pay a monthly wage or do you just need to buy the minutes and that's all?
    13·2 answers
  • System requirements that are important in determining if a software program will work on a computer are ____.
    8·1 answer
  • 22 If you are involved in a violation and you do not have insurance to comply with the __________________, your driver license a
    9·2 answers
  • If an individual column is listed in a SELECT clause, along with a group function, the column must also be included in a(n) ____
    12·1 answer
  • 1. You have just upgraded memory on a computer from 4 GB to 8 GB by adding one DIMM. When you first turn on the PC, the memory c
    13·2 answers
  • Explain how devices on a lan access resources in a small to medium-sized business network.
    15·1 answer
  • NEED IT ASAP. Jack is an accountant. He cant access the spreadsheet software, which is installed on the server. what should jack
    13·1 answer
  • What is the output?
    7·2 answers
  • How to write conclusion of hard disk​
    11·1 answer
  • A penetration tester is experimenting with Network Mapper (Nmap) on a test network as a privileged user. The tester would like t
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!