1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksi-84 [34.3K]
3 years ago
8

/*

Computers and Technology
1 answer:
andrew-mc [135]3 years ago
5 0

Answer:

Having tested your source code, I realize that there is nothing to be added or removed from the source code you uploaded as your program works perfectly.

However, I've rearranged properly the lines of the program you uploaded.

See attachment

Explanation:

See Explanation

Download java
You might be interested in
I NEED SOME MAJOR HELP W/ THIS!!! PLSSS. WHOEVER HELPS GETS 80 POINTS!!! I NEED IT DONE SOON! TYY <3;)
Oksanka [162]

Answer:

I probably won't awnser them all but I'll try my best

Explanation:

Hacking is a breach of privacy online usually caused by some kind of malware injected into your device there's multiple types of this program or files malware which simply damages and harms your device. A Trojan horse is a program which tricks you by selling you a fake product which has code in it which has code which gives the hacker remote access to your device this program is usually free and masked like a crack or patch of a certain program. U got the second an third question with this one so u can just divide it into pieces. Piracy is Hacking but this time the hacker is stealing ur information through the malware. Invasion of privacy can have multiple forms online and offline. Online intrusion is when a service gives out information you entrust to it while off line Intrusion is stalking trespassing blackmail etc.

4 0
3 years ago
A web page that allows interaction from the user​
kirill115 [55]

Answer:

Its A Dynamic Web Page

Explanation:

5 0
3 years ago
Which would be the best reason to consider using plain tables instead of shaded tables in a document?
Eva8 [605]
The best reason to consider using plain tables instead of shaded tables in a document if the document will be copied frequently. The shaded table will  be copied exactly as shaded, and time will be wasted unshading (converting shaded table to plain table) them.  
3 0
4 years ago
Read 2 more answers
.____________ is a way to identify and differentiate goods andservices through use of a name or distinctive design element.
padilas [110]

Answer: Brand

Explanation:

A brand is a way to identify and differentiated the good and services as, brand is the process, which is used for the business and the marketing strategies. Basically, it is used as communication method for distinguished the products and the company for creating the good impression for customers. Brand awareness and management is the main key components.  

3 0
4 years ago
A time-saving strategy that helps define unfamiliar words involves using
yuradex [85]

The correct answer is A. Familiar words for clues

Explanation:

Finding unfamiliar words is common while reading, especially in texts that belong to a specific field such as medicine, technology, etc. This can be handled through multiple strategies such as using a dictionary, guessing the meaning of the word based on its parts, and using context clues.

In this context, one of the easiest and most time-saving strategy is the use of context clues that implies using the familiar words as clues to guess the meaning of an unfamiliar word. This is effective because in most cases the meaning of an unknown word can be determined using the context of the word or words around the unknown word. Also, this strategy takes little time because you only need to analyze the sentence or paragraph where the unknown word is. Thus, the time-saving strategy to define unfamiliar words involves using familiar words for clues.

6 0
3 years ago
Read 2 more answers
Other questions:
  • Why are there 2 types of ip addresses like 172.16.254.1 or 2001:db8:0:1234:0:567:8:1?
    10·1 answer
  • What's the problem with this code ?
    14·1 answer
  • Modern car odometers can record up to a million miles driven. What happens to the odometer reading when a car drives beyond its
    8·1 answer
  • Which of the following is ideal for long distance communication ?
    5·1 answer
  • How do you optimize a website using JavaScript?
    10·1 answer
  • What is the term given to the controls that let you interact with an operating system?
    11·1 answer
  • The older computer had a CPU that ran at 266MHz compared to a current CPU that runs 3.7GHz. How many times faster is the new CPU
    7·1 answer
  • Explain two ways that you can create a header.
    14·1 answer
  • Which of the following is not a use of a hash function
    7·1 answer
  • The BCD number for decimal 473 is( ). a) 111011010; b) 010011110011; c) 010001110011; d)0010110110​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!