1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marat540 [252]
3 years ago
13

Which of the following works did mozart NOT write? A.the surprise symphony B. the magic flute C. eine kleine nachtmusik

Computers and Technology
2 answers:
mixer [17]3 years ago
5 0

Answer:

A: The surprise symphony

Explanation:

its the answer for apex

alina1380 [7]3 years ago
4 0

Answer:

The suprise Symphony

You might be interested in
What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter d
kipiarov [429]

Answer:

D. Hybrid

Explanation:

Hybrid attack is a dictionary attack combined with a brute Force attack, alter the dictionary word by adding numbers at the end of the password, spelling the word backward and slightly misspelling or adding special characters to the word.

Brute Force attack is a password hacking technique that continuously input various values to crack or guess a correct password value.

4 0
4 years ago
Read 2 more answers
If you ship bakudeku. I swear. <br> *RANTS*
Bad White [126]

cries in bakudeku shipper

3 0
3 years ago
PYTHON:
tankabanditka [31]

Answer:

figure of merit is a quantity used to characterize the performance of a device, system or method, relative to its alternatives. In engineering, figures of merit are often defined for particular materials or devices in order to determine their relative utility for an application.

3 0
3 years ago
Which screen should be open to customize or personalize a desktop background?
stira [4]
Display Properties is the screen that should be open
5 0
3 years ago
Read 2 more answers
Write a program that inputs the following information from the user, using the Win32 Read-Console function: first name, last nam
Jobisdone [24]

Answer:

Following are program using c#

using System;

class detail

{

 static void Main() // main function

 {

     string first_name,last_name, number1; // variable declaration

     int age1;                             //variable declaration

Console.WriteLine("Enter the First Name  ");

first_name = Console.ReadLine(); // read input by win32

Console.WriteLine("Enter the Last Name  ");

last_name = Console.ReadLine(); // read input by win32

Console.WriteLine("Enter the Age  ");

age1 = Int32.Parse(Console.ReadLine()); // read input by win32

Console.WriteLine("Enter the Phone Number  ");

number1 = Console.ReadLine(); // read input by win32

Console.WriteLine("Following are the data which are  entered  ");

Console.WriteLine("First Name  :"+first_name); // display data

Console.WriteLine("Last Name   :"+last_name); // display data

Console.WriteLine("Age         :"+age1);//display data

Console.WriteLine("Phone Number:"+number1); // display data

 }

}

Explanation:

In this program we have declared  first_name,last_name, number1 variable as the string type and age1 as integer type after that we are taking input from user by win32 Read console i.e Console.ReadLine()  function and finally printed the same  information.

Output:

Enter the First Name

san

Enter the Last Name

lan

Enter the Age

45

Enter the Phone Number

9045454545

Following are the data which are  entered

First Name       :san

Last Name        :lan

Age                   :45

Phone Number :9045454545

4 0
4 years ago
Other questions:
  • The opening of the throttle plate can be delayed as long as
    13·1 answer
  • Technology that is attached to a tag and used to identify postal packages is a(n) _____.
    12·2 answers
  • Which statement correctly describes how the density and temperature of air is related .
    7·1 answer
  • (The Location class) Design a class named Location for locating a maximal value and its location in a two-dimensional array. The
    10·1 answer
  • What are computers used for?
    14·2 answers
  • What term is used to describe the time it takes a signal to travel from one location to another on a network?
    13·1 answer
  • Please write down a java program for below instruction.Min-Heap: Construct a Min_Heap from the following set of integers. Rememb
    5·1 answer
  • Đánh giá hoạt động thanh toán điện tử của sinh viên
    6·1 answer
  • Who wanna be besties
    8·2 answers
  • Which of the following bit value represent -5 in two's complement notation?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!