1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ella [17]
3 years ago
14

Put these steps for managing your study time in chronological order. 1 set aside the same time each day 2 Identify the best time

of day 3 Stick with it​
Computers and Technology
1 answer:
Mashutka [201]3 years ago
8 0

Answer:

1 identify the best time of day 2 set aside the same time each day 3 stick with it

You might be interested in
Match the Job description with the job titles.
koban [17]
1) Bricklayer 2) Roofer 3) Architectural drafter 4) landscape architect
6 0
2 years ago
Read 2 more answers
WILL GIVE BRAINLIST IF ANSWERED RIGHT 1. An engine's _______ contains the cylinder block, the cylinders, the piston, the connect
miss Akunina [59]
First three are c b and d
3 0
3 years ago
Read 2 more answers
4. Write a program to calculate square root and<br>cube root of an entered number .​
nataly862011 [7]

Answer:

DECLARE SUB SQUARE (N)

CLS

INPUT “ENTER ANY NUMBER”; N

CALL SQUARE(N)

END

SUB SQUARE (N)

S = N ^ 2

PRINT “SQUARE OF NUMBER “; S

END SUB

3 0
3 years ago
over time, you have noticed unauthorized configuration changes made to virtual machine cloud settings. you need a way to track w
Nuetrik [128]

One way to track who made these changes to the virtual machine cloud settings and when is to: D. enable cloud resource activity auditing.

<h3>What is a cloud?</h3>

In Computer technology, a cloud can be defined as the elastic leasing of pooled computer resources such as physical hardware through virtualization and over the Internet, so as to enable the storage and sharing of files and documents virtually and in real-time.

In this scenario, we can reasonably infer and logically conclude that one way to track who made these changes to the virtual machine cloud settings and when is to enable cloud resource activity auditing because it would provide a log of actions such as information about the engineer who made configuration changes.

Read more on a virtual machine here: brainly.com/question/12060797

#SPJ1

Complete Question:

Over time, you have noticed unauthorized configuration changes made to virtual machine cloud settings. You need a way to track who made these changes and when. What should you do?

A. Enable virtual machine API integration.

B. Rotate the cloud access keys.

C. Deploy an OSI layer 7 firewall.

D. Enable cloud resource activity auditing.

7 0
1 year ago
Write a program called telephone.java that prompts the user to enter their phone number using the specific format: (xxx) xxx-xxx
djverab [1.8K]

Answer:

Following are the program in the Java Programming Language.

//import package scanner class

import java.util.Scanner;

//define class

public class telephone {

//define main method

public static void main(String[] args) {

//set object of the scanner class

Scanner sc = new Scanner(System.in);

//print message

System.out.println("Enter tele-phone no. using this format: (xxx)xxx-xxxx: ");

//get input from the user

String phn = sc.next();

//check length of phone number is equal to 13

if(phn.length() == 13) {

//check phone no. containing parentheses

if(phn.charAt(0) == '(' && phn.charAt(4)==')' && phn.charAt(8) == '-') {

//initializing the values

String num1 = phn.substring(1,4);

String num2 = phn.substring(5,8);

String num3 = phn.substring(9);

//check the following input is numeric or not

if(num1.matches("[0-9]+") && num2.matches("[0-9]+")&& num3.matches("[0-9]+")) {

//then, print valid message

System.out.println("Given phone number is valid");

}

//otherwise

else {

//print invalid message

System.out.println("Given phone number is invalid");

}

}

//otherwise

else {

//print invalid message

System.out.println("Given phone number is invalid");

}

}

//otherwise

else {

//print invalid message

System.out.println("Given phone number is invalid");

}

}

}

Explanation:

Following are the desciption of the program

  • Declared a class telephone
  • Read a input phone number in phn variable of string type.

Check the following condition of phone number

  •  if "phn"=="13" then it check for the parenthesis and number is valid otherwise phn number is invalid .
8 0
4 years ago
Other questions:
  • When you enable user access control (uac)
    11·1 answer
  • Manuel is working on a project in Visual Studio. He wants to keep this program showing on the entire desktop, but he also needs
    7·1 answer
  • What concerns do you need to have with individuals hacking your information, computer, personal devices, and car? How can you pr
    5·1 answer
  • To change a chart's data series, make the chart active, then in the data group on the chart tools design tab, click the _____ bu
    9·1 answer
  • What are three steps to use to research relevant information on the internet? (Site 1)
    13·2 answers
  • The inability of BAE Automated Systems to create an automated baggage handling system led to a significant delay in the opening
    10·1 answer
  • What is the result when you run the following program?
    12·1 answer
  • Use ordinary pipes to implement an inter-process communication scheme for message passing between processes. Assume that there a
    12·1 answer
  • What is bespoke software???​
    9·2 answers
  • Write a program that declares and initializes a variable representing the weight in milligrams from the keyboard. The program di
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!