1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
san4es73 [151]
3 years ago
14

JAVA Code:

Computers and Technology
1 answer:
Burka [1]3 years ago
6 0
Dear ,you should ask it on stackoverflow and geekforgeelks , not here
You might be interested in
Public class Bird
Anna007 [38]

Answer:

Answer below.

Explanation:

You are creating an object of bird "b" with a talon strength of 5 and a beak of 5.

public Hawk(int talon, int beak)

{

super(beak);

talonStrength = talon;

}

Please mark brainliest if this is the answer you were looking for

Please mark brainliest if this is the answer you were looking for

6 0
3 years ago
In the event of a network attack or intrusion, a _____ lists the tasks that must be performed by the organization to restore dam
dexar [7]

Answer:

The answer is "Recovery Plan for Disasters".

Explanation:

In the given statement, some of the information is missing, which can be described as follows:

A) systems engineering plan

B) security compliance plan

C) risk assessment plan

D) Recovery Plan for Disasters

It is a set of guidelines for the execution of a recovery process, it provides the restoration and safety to the system for the organization in the event of a disaster. It defined as "a detailed summary of the appropriate acts to be carried out before, during and after a disaster", and incorrect choices were explained as follows:

  • In option A, It is used to design and analyze complex systems.
  • In option B, It provides frameworks for the corporate evaluation process.
  • In option C, It is used to identify the problems.
6 0
3 years ago
What helps companies and organizations to target masses of people, provide 24/7 services, and deliver better marketing in a chea
Sever21 [200]
The money their making
6 0
3 years ago
Cascading style sheets (css) use special hypertext markup language (html) tags to globally define font characteristics for a var
ehidna [41]
The statement that Cascading style sheets (CSS) use special hypertext markup language (HTML) tags to globally define font characteristics for a variety of page elements as well as how those elements are laid out on a web page is true. <span> CSS is a stylesheet language used to describe the presentation of a document written in HTML or XML.</span>
5 0
3 years ago
What two methods can be used to access and modify an existing program that is running on an iot device in cisco packet tracer? (
dsp73

Cisco Packet Tracer is tool used for network simulation and visualization program.

The two methods can be used to access and modify an existing program that is running on an IoT device in Cisco packet trace are the following:

1. Click on the device then select the Programming tab.

2. Go to the registration server and login. Then select the Editor tab.

3 0
3 years ago
Other questions:
  • Hi, I have several computer questions. These refer to the history of the internet. I would like to know if everything we look fo
    12·1 answer
  • In doing a load of clothes, a clothes drier uses 18 A of current at 240 V for 59 min. A personal computer, in contrast, uses 3.0
    7·1 answer
  • What is the purpose of copyfitting?
    12·1 answer
  • Jason is working on a project that requires him to manage a huge amount of data. The spreadsheet he is working on has data relat
    10·1 answer
  • What is sum after the following loop terminates? int sum = 0; int item = 0; do { item ; sum = item; if (sum &gt; 4) break; } whi
    8·2 answers
  • A firm offers virtual local area networks and firewalls as an on-demand cloud service. Which service does the firm offer?
    11·2 answers
  • Viết thuật toán, chương trình xử lý hạn chế trong việc xử lý số liệu phần nguyên để hiển thị lên lcd
    14·1 answer
  • Describe the different non-printing characters,​
    11·1 answer
  • A school has an intranet for the staff and students to use. Some of the files stored on the intranet are confidential. Give two
    15·1 answer
  • 6.What does transgenic mean?​
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!