1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Law Incorporation [45]
3 years ago
13

Do you believe that oop should be phased out and we should start working on some alternative?

Computers and Technology
1 answer:
Ksju [112]3 years ago
5 0
I don’t think we should because we all have our one choices that we should achieved and we should show
You might be interested in
Why might it be important to be careful when placing multiple microphones around the same sound source
Softa [21]

Answer:

I think you can get mic feedback from all of the microphones

Explanation:

Let me know if this is the answer you are looking for

8 0
3 years ago
Which of the following gestures would you use if you want to activate a link on your new tablet?
Gre4nikov [31]

Answer:

press and hold

Explanation:

When you press and hold, some open a menu where you can add a link

8 0
3 years ago
array of String objects, words, has been properly declared and initialized. Each element of words contains a String consisting o
Vlad [161]

Answer:

for(String s:words)

   if(s.endsWith("ing"))

 System.out.println(s);

Explanation:

Create an enhanced for loop that iterates through the words array

Check if an element in words ends with "ing" using endsWith() method (Since it is said that strings are lowercase letters, we do not need to check it)

If you find one that ends with "ing", print the element

5 0
3 years ago
Are the ways data represented and transmitted with computer law of nature or by law of man?
hammer [34]
Data representation is law of man.
5 0
3 years ago
Computer forensics is practiced _____. A. Only by specially trained government and law-enforcement personnel B. By many organiza
laiz [17]

Answer:

Option B is the correct answer.

<h3>Computer forensics is practiced by many organizations, including public- and private-sector organizations such as hospitals, law enforcement, and businesses. </h3><h3 />

Explanation:

Computer forensics can be defined as a branch of digital forensics that deals with the evidences and and proofs found on all digital storage media such as computers.

It is basically a step for enhancing security bases of communication. Therefore it is mainly used by law-enforcement personnel but it can also be practiced by other institutions for the purpose of self security.

<h3>I hope it will help you!</h3>
4 0
3 years ago
Other questions:
  • List five types of system information that can be obtained from the windows task manager. how can you use this information to co
    5·1 answer
  • You just read an msds for acetic acid. based on what you read, what type of information is included in an msds sheet? record you
    7·1 answer
  • Can your computer become infected with a virus via email
    6·1 answer
  • A Use-Case diagram is a staticdiagram?
    7·1 answer
  • A restaurant has a case type that allows customer to book the dining room for events. Customers provide basic information includ
    7·1 answer
  • Beth accidentally clicked Send on a message that was addressed to multiple recipients. She wants to use the recall option. Which
    15·1 answer
  • All the read/write heads a hard disk are controlled by a(n) ____ which moves the read/write heads across the disk surfaces in un
    13·1 answer
  • Free 35 points!!!
    11·2 answers
  • Why do we need on output device?​
    11·2 answers
  • Accenture is one of several hundred companies that has signed on to the united nations global compact (ungc) business ambition p
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!