1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alchen [17]
4 years ago
13

Select all that apply.

Computers and Technology
1 answer:
Leto [7]4 years ago
8 0
You may do all of the given options.
Thank You!
You might be interested in
Java Programming home > 1.14: zylab training: Interleaved input/output Н zyBooks catalog Try submitting it for grading (click
Andru [333]

Answer:

The following are the code to this question:

code:

System.out.println(x);  //use print method to print value.

Explanation:

In the given question, it simplifies or deletes code in the 11th line. This line has a large major statement.  

In the case, the tests fail because only 1 line of output is required by the tester, but two lines are obtained instead.

It's to demonstrate that the input/output or testing requirements function throughout the model.

5 0
4 years ago
What education and training is required to be an applications software engineer?
Vitek1552 [10]
Expertise in Computer Science/ Computer Programming Tools. C, C++, Java Visual Basic , Android or iphone. BS Software Engineering
7 0
4 years ago
How can chess computers be programmed so that it can be so accurately adjusted to a skill level ranging from a beginner to a gra
Elis [28]
They are artificially intelligent. They watch thousands of hours of videos of the game they are going to play. After they learn, they challenge themselves against themselves and save all the moves it used that time, they play another game against the saved game and if they best it then they save the new and repeat. I am not sure about this because I am just a 15 yr old but the early ones brute forced the game and one. Brute Forcing is a way to try out every possible move and pick the most like to succeed or the most efficient one, brute force is also used in hacking or cracking passwords that have something in common. Like let's say ur password is Jakeis35. I would make a list that would be:
Jake
jake
Is
is
35
34

and with a software it will put together every possible pair and will stop when it matches the password on the server or if the password let it login.
5 0
3 years ago
Directions: Identify the measuring devices and write its functions.
FrozenT [24]

Answer:

1.weigher - to weigh meat

2.

3. scissor - to cut things

4. tongs

5.measuring cups - to measure dry ingredients like flour

6 temperature - measures temperature

7 measuring spoons

5 0
3 years ago
Ejemplo la violencia no se combate con violencia
Hatshy [7]

Answer:

ur right violence should not be fought by violence

but sometimes there are problems in the world

that just happens to lead with violence

6 0
3 years ago
Other questions:
  • What is the advantage of defining a target user?
    14·1 answer
  • Someone plzzzzz help me!!!
    6·1 answer
  • Which of the following does NOT describe a node?
    10·2 answers
  • A certain string-processing language offers a primitive operation which splits a string into two pieces. Since this operation in
    10·1 answer
  • You've been hired as a consultant to help an online store owner. You need to complete the implementation of conversion tracking
    6·1 answer
  • In which network zone should a web server be placed?
    14·1 answer
  • Java variable is the name of a Group of answer choices numeric data value stored in memory data value stored in memory that can
    15·1 answer
  • Most project files will contain:
    9·1 answer
  • Accept total number of participants (B) in class. A group of
    12·1 answer
  • During an IFR flight in IMC, you enter a holding pattern (at a fix that is not the same as the approach fix) with an EFC time of
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!