1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Cerrena [4.2K]
4 years ago
8

In some programming languages, such as C#, Visual Basic, and Java, every class you create is a child of one ultimate base class,

often called the ____ class
Computers and Technology
1 answer:
tiny-mole [99]4 years ago
3 0

Answer:

Explanation:They are called MICROSOFT class

You might be interested in
Write a Python function LetterGame() that repeatedly asks the user to input a letter. The function is to count the number of vow
kotegsom [21]

Answer:

def LetterGame():

   vowels = ["a", "e", "i", "o", "u", "A", "E", "I", "O", "U"]

   count1 = count2 = 0

   while True:

       choice = input("Enter a letter / digit to stop: ")

       if choice.isdigit():

           break

       elif choice.isalpha():

           count1 += 1

           if choice in vowels:

               count2 += 1

   print("You entered " + str(count1) + " letters, " + str(count2) + " of which weere vowels.")

   print("The percentage of vowels was " + str(count2 / count1 * 100) + "%")

LetterGame()

Explanation:

Create a function called LetterGame

Inside the function:

Create a list of vowels

Initialize count1, counts the total letters, and count2, counts the vowels

Initialize a while loop that iterates until the specified condition is met in the loop

Get the input from the user. If it is a digit, stop the loop. If it is an alphabet, increase the count1 by 1, and also check if it is a vowel. If it is a vowel, increment the count2 by 1

When the loop is done, print the required information

Finally, call the function

4 0
3 years ago
What is etiquette? A. When a variety of differing cultures are combined in one place B. The limitations to the rights and opport
Karo-lina-s [1.5K]
The correct answer should be D. A set of standards for proper behavior in a particular culture.

8 0
4 years ago
You are implementing a new application control solution. Prior to enforcing your application whitelist, you want to monitor user
shepuryov [24]

Answer: Flag

Explanation:

When using an application control solution, it should be noted that the application whitelist is typically centrally defined which is applied to the network devices. In such case, the applications that are contained in the whitelist will be the only one that are allowed.

Therefore, the applications that are not contained in the whitelist should be flagged. This is necessary in order to effectively monitor the user traffic for a period of time in order to discover user behaviors.

5 0
3 years ago
To annotate a document with a remark for another reviewer to address, select the _____ feature.
Gala2k [10]
<span>To annotate a document with a remark for another reviewer to address, select the Comments feature. 

In both Excel and Word, you can go to the toolbar and select review and you will see "New Comment." Select the word (in Microsoft Word) or the cell (in Microsoft Excel) add click on the "New Comment". </span>
3 0
3 years ago
Read the four detective reports and the combined affidavit and warrant for the M57 Patents case. Write a one- to two-page paper
Fantom [35]

Answer:The 2009-M57-Patents scenario tracks the first four weeks of corporate history of the M57 Patents company. The company started operation on Friday, November 13th, 2009, and ceased operation on Saturday, December 12, 2009. As might be imagined in the business of outsourced patent searching, lots of other activities were going on at M57-Patents.

Two ways of working the scenario are as a disk forensics exercise (students are provided with disk images of all the systems as they were on the last day) and as a network forensics exercise (students are provided with all of the packets in and out of the corporate network). The scenario data can also be used to support computer forensics research, as the hard drive of each computer and each computer’s memory were imaged every day.

Explanation:

4 0
3 years ago
Other questions:
  • Slmething about device for defrosting windscreen?
    5·1 answer
  • Which one of the following is the correct code snippet for calculating the largest value in an integer array list aList?
    5·2 answers
  • The title element in the head section of an HTML document specifies the text
    14·1 answer
  • The statistically multiplexed wan technology that is specifically designed to carry multiple kinds of traffic (data and voice is
    8·1 answer
  • WILL MARK BRIAN PLZ HELP PLZ I BEG YOU While levels often change in order to give a game some more variability, they might also
    11·1 answer
  • Julie I'm here so help me I'm red
    15·1 answer
  • List the main industries in Sierra Leone​
    5·1 answer
  • GMI = $4,666.67 Total Monthly Deductions $1,131.00 What is the Net Monthly Income (GMI - Total Monthly Deductions) =
    9·1 answer
  • All banks follow the same guideline for determining if an applicant qualifies for a loan.
    13·1 answer
  • What is control structure write it's types​ .
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!