1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nookie1986 [14]
3 years ago
15

PLEASE help me RIGHT NOW!!!!!!!!! I will give a Brainly to anyone who helps me!

Computers and Technology
1 answer:
dybincka [34]3 years ago
8 0
I am deeply sorry for the experience that you have received, I am disappointed in myself for letting this happen. If it would be possible I would like to make it up to you. Again, I am deeply sorry that this happened. 
Sincerely *enter full name*

I am not sure if you have any multiple choice options but I hope this works xx
You might be interested in
Random.choice will choose a number between 1 and 100. True False​
DaniilM [7]

Answer: False.

Explanation: Random.choice can choose between any 2 numbers.

6 0
3 years ago
Which technology has the potential to be misused to make atomic bombs? A. computer technology B. nuclear technology C. medical t
Tcecarenko [31]

Answer:

B) Nuclear Technology

Explanation:

Nuclear technology involves atomic nuclei reactions which are used to generate energy. The product of nuclear reactions has huge advantages in Medicine, Agriculture, power generation, Water Desalination etc. However This technology can be misused to produce nuclear bombs (atomic bombs) Which are very dangerous weapons of mass destruction.

Since nuclear reactions involve chain (continous) reactions, they effective damage of detonating a nuclear bomb is huge.

4 0
3 years ago
This question involves the creation of user names for an online system. A user name is created based on a user’s first and last
Evgen [1.6K]

Answer:

See explaination

Explanation:

import java.util.*;

class UserName{

ArrayList<String> possibleNames;

UserName(String firstName, String lastName){

if(this.isValidName(firstName) && this.isValidName(lastName)){

possibleNames = new ArrayList<String>();

for(int i=1;i<firstName.length()+1;i++){

possibleNames.add(lastName+firstName.substring(0,i));

}

}else{

System.out.println("firstName and lastName must contain letters only.");

}

}

public boolean isUsed(String name, String[] arr){

for(int i=0;i<arr.length;i++){

if(name.equals(arr[i]))

return true;

}

return false;

}

public void setAvailableUserNames(String[] usedNames){

String[] names = new String[this.possibleNames.size()];

names = this.possibleNames.toArray(names);

for(int i=0;i<usedNames.length;i++){

if(isUsed(usedNames[i],names)){

int index = this.possibleNames.indexOf(usedNames[i]);

this.possibleNames.remove(index);

names = new String[this.possibleNames.size()];

names = this.possibleNames.toArray(names);

}

}

}

public boolean isValidName(String str){

if(str.length()==0) return false;

for(int i=0;i<str.length();i++){

if(str.charAt(i)<'a'||str.charAt(i)>'z' && (str.charAt(i)<'A' || str.charAt(i)>'Z'))

return false;

}

return true;

}

public static void main(String[] args) {

UserName person1 = new UserName("john","smith");

System.out.println(person1.possibleNames);

String[] used = {"harta","hartm","harty"};

UserName person2 = new UserName("mary","hart");

System.out.println("possibleNames before removing: "+person2.possibleNames);

person2.setAvailableUserNames(used);

System.out.println("possibleNames after removing: "+person2.possibleNames);

}

}

8 0
3 years ago
The chain of _____ documents that the evidence was under strict control at all times and no unauthorized person was given the op
Arturiano [62]

Answer:

custody.

I hope I could help

4 0
2 years ago
What is an example of a hard skill?
Serjik [45]
3 would be self management
4 0
3 years ago
Read 2 more answers
Other questions:
  • Dan is a Civil Engineer for a company that builds nuclear power plants throughout the world. Which best describes the places he
    14·2 answers
  • The overall purpose of a food guide is________.
    11·1 answer
  • What is a flash player?
    9·2 answers
  • Why is it a mistake to put e-mail address of people who don't know each other in the "to:" field
    9·2 answers
  • --------------------is a host that runs software to provide information, such as web content, to other hosts.
    9·1 answer
  • Why are ethics important in PR?
    8·1 answer
  • What are Important points to include about preventing the download of malware?
    14·1 answer
  • The lines that connect the points of a polygon are called: (1 point)
    6·2 answers
  • How can your network be infected with malware or ransomware?
    6·1 answer
  • Question 2 of 25
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!