1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mice21 [21]
4 years ago
10

Repl.it Assignment 4.1.2 (Guess the Number) Please help me I will give brainliest and a like

Computers and Technology
1 answer:
dmitriy555 [2]4 years ago
5 0
Like 4 .1.2 -31 or 21
You might be interested in
Help with number 12 please!
sleet_krkn [62]
In #1 A can pass legally, in #2 B can pass legally, and in #3 neither can pass legally.
5 0
3 years ago
How does a 3D CAD solid model program display the progression of work involved in creating a model?
torisob [31]

Answer:

by listing the features used to make the part in the order that they are made.

Explanation:

A 3D CAD solid model program display  the progression of work involved in creating a model by listing the features used to make the part in the order that they are made.

6 0
3 years ago
In computer Drag and Drop“ means to select the items, hold down the mouse and
kompoz [17]

Answer:

Release the mouse in the desired location.

5 0
3 years ago
How would you define the rule of thirds
tatuchka [14]
One of the fundamentals of painting and photography, the Rule of Thirds is a technique designed to help artists and photographers build drama and interest in a piece. The rule states that a piece should be divided into nine squares of equal size, with two horizontal lines intersecting two vertical lines.
6 0
3 years ago
According to what theory did the universe expand explosively into existence 13.7 billion years ago?
Llana [10]
That Theory is known as "Big-Bang Theory"

Hope this helps!
3 0
3 years ago
Read 2 more answers
Other questions:
  • Technician A says that if the coefficient of friction is too low, the brakes will grab.
    12·1 answer
  • Attempting to determine a password that is not known to the attacker is often called ____.
    13·1 answer
  • Two words are a ""reverse pair"" if each is the reverse of the other. Write a program that finds all the reverse pairs in the wo
    12·1 answer
  • Write the definition of a function printDottedLine, which has no parameters and doesn't return anything. The function prints to
    10·1 answer
  • A Network Management Station (NMS) is using SNMP to manage some Cisco routers and switches with SNMPv2c. Which of the following
    10·2 answers
  • Write a program to enter a number and test if it is greater than 45.6.if the number entered is greater than 45.6 the program nee
    13·1 answer
  • 2. Which the following may be a reason for giving a Page Quality (PQ) rating og Highest? Select all that apply (True or False)
    14·1 answer
  • which of these variable declarations will the variable remain uninitialized unless it is explicitly initialized?1)Declaration of
    5·1 answer
  • How do I log into PGCPS?
    14·1 answer
  • Create two functions to calculate the area and circumference of the circle using pointer.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!