1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tino4ka555 [31]
3 years ago
15

Rachael has been posting negative comments on several of her peers' social media pages. Which of the six Ps is Rachael abusing?

Computers and Technology
1 answer:
posledela3 years ago
4 0
The answer is D. Personification
You might be interested in
Write a script named numberlines.py. This script creates a program listing from a source program. This script should: Prompt the
ddd [48]

Answer:

See explaination for program code.

Explanation:

inputFileName = input("Input filename: ") outputFileName = input("Output filename: ") inputFile = open(inputFileName, "r") outputFile = open(outputFileName, "w") count = 1 for line in inputFile: newLine = str(count).rjust(4, " ") + "> " + line outputFile.write(newLine) print(newLine) count += 1

4 0
3 years ago
Each peripheral device has its own software, called a(n) ____, which contains the detailed instructions required to start that d
olga nikolaevna [1]
OS or operating system
4 0
3 years ago
How do you copy a file​
trasher [3.6K]

Answer:

right click and press control c

8 0
3 years ago
The destructor automatically executes when the class object goes out of ____.
Tema [17]

Answer:

scope    

Explanation:

Destructor is a member function and it call automatically when the class object goes out of scope.

Out of scope means, the program exit, function end etc.

Destructor name must be same as class name and it has no return type.

syntax:

~class_name() { };

For example:

class xyz{

  xyz(){

        print(constructor);

   }

~xyz(){

        print(destructor);

   }

}

int main(){

    xyz num;

   

}//end program

when the object is create the constructor will called and when the program end destructor will call automatically.

4 0
3 years ago
Password combined with pin used as an authentication requirement is an example of:
Bingel [31]
...something that the user knows.
4 0
3 years ago
Other questions:
  • Presentation software allows business professionals to _____.
    14·2 answers
  • Your neighbor has moved to another country. He informs you about his new job. You wantto congratulate him by sending an e-mail m
    13·1 answer
  • An installed theme can be applied by clicking on a theme in the themes group on the ____ tab.
    7·2 answers
  • What keyword do we use when instantiating an object _________________
    15·1 answer
  • str1=”Good” str2=”Evening” Does the concatenation of the above two strings give back a new string or does it concatenate on the
    14·1 answer
  • Dispositivo de computo
    5·1 answer
  • Which type of protocol allows for a secure data transmission using encryption methods?
    7·1 answer
  • Which data type can store decimal or fractional numbers?
    15·2 answers
  • Anyone know what the very first question that was sent on brainly is?
    15·2 answers
  • What would be a social networking page background for Sigmund Freud?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!