1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
puteri [66]
4 years ago
11

Computer simulations can: A. accurately predict the weather a month in advance.

Computers and Technology
1 answer:
loris [4]4 years ago
7 0
I believe the answer is A but i am not too sure :/
You might be interested in
. Constructors are executed when?
adoni [48]

Answer:

 The constructor are executed when the constructor object are comes in the existence as per the general rule in the computer programming language. The constructor is the special type of the class function that basically perform the initialization of the each object in the computer science.

Then, the constructor initialized actual value of the member of an object are allocated to the given object in the system.  

6 0
3 years ago
You manage the IT department at a small startup Internet advertiser. You need to set up an inexpensive system that allows custom
PSYCHO15rus [73]

Answer:

Answer is extranet.

Refer below.

Explanation:

You manage the IT department at a small startup Internet advertiser. You need to set up an inexpensive system that allows customers to see real-time statistics such as views and click-throughs about their current banner ads. The type of system will most efficiently provide a solution is Extranet.

3 0
3 years ago
You can get context-sensitive help information from the code editor by
Drupady [299]
Visual Studio* IDE Code Editor.
8 0
3 years ago
Anna is making a presentation on the solar system. She wants to emphasize the planet names as they appear one by one on the pres
Svetach [21]

slide transition effect.

5 0
3 years ago
. An access specifier is one of three keywords:
Zolol [24]

Answer:

Access specifiers are used to control the visibility of members like classes, variables and methods. There are three access specifiers: public, private and protected. We shall see only about the public and private access specifiers for now. Protected access specifier comes into picture when inheritance is implemented. plz brainly me

Explanation:

8 0
3 years ago
Other questions:
  • Can embedded computers automate security so you can lock and unlock doors remotely
    15·1 answer
  • If you see ##### in a cell, you should
    10·1 answer
  • Two powerboats are about to cross paths. what should the boat on the starboard (right) do?
    11·1 answer
  • Help!!! Who is this? Who is it from?
    14·2 answers
  • Which option can be used to access more settings than are available in the Backstage view?
    5·1 answer
  • Ram is also called __________________________________________________
    11·1 answer
  • To generate a series of first ten counting number of algorithm​
    9·1 answer
  • Complete the following statements by choosing the correct answer from the drop-down menus.
    6·1 answer
  • It is the responsibility of a manager to understand the company’s IT architecture and corresponding infrastructure so that the
    8·1 answer
  • _______ refers to the use of gps or rfid technology to create virtual boundaries that enable software to trigger a response when
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!