1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rusak2 [61]
3 years ago
13

In Java please.

Computers and Technology
1 answer:
SSSSS [86.1K]3 years ago
3 0

Explanation:

la verdad es que java es muy estrcita deves entrar al link java y descaragrla de nuevo luego haces eso otra vez y te funcionara

You might be interested in
Picture related to cyber safety
Fantom [35]

Answer:

?????

Explanation:

4 0
3 years ago
Read 2 more answers
On a wireless network use _____ to ensure that only authorized client computers are able to access the wireless network.
grigory [225]

Answer:

That

your answer

MAC address filtering

5 0
3 years ago
Which of the following is something that would NOT appear in the Reviewing pane?
Sophie [7]

Answer:

A

Explanation:

7 0
3 years ago
What is the real meaning of hack and crack?
vovangra [49]
Hack means hack computer and crack means I guess your behind
7 0
3 years ago
Brainstorm what you want your LED board to do. What would need to happen first? What happens next?
lbvjy [14]
First it will glow then change what color you want
5 0
3 years ago
Read 2 more answers
Other questions:
  • What is the type of account and normal balance of allowance for uncollectible accounts?
    13·2 answers
  • Which two sentences uses the colon correctly?
    13·1 answer
  • !WILL MARK BRAINLIEST!
    8·1 answer
  • Explain motherboard in detail
    14·2 answers
  • WAFL (write-anywhere file layout) Select one: a. is a distributed file system b. is a file system dedicated to single user opera
    6·1 answer
  • HELLLLLLLLPPPPPPPPPPPP HHHHHHHHHEEEEEEEEELLLLLLPPPPPP MEEEEEEEE
    12·2 answers
  • A Product Manager has been given responsibility for overseeing the development of a new software application that will be deploy
    5·1 answer
  • Which type of service offers a preconfigured testing environment for application developers to create new software applications
    13·1 answer
  • In additon to setting up services, what other tasks does a sysadmin have to keep in mind? check all that apply.
    11·1 answer
  • Most spyware programs are benign in that they do not perform malicious acts or steal data. group of answer choices true false
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!