1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
goldfiish [28.3K]
3 years ago
9

Giving Brainliest IFFF CORRECT

Computers and Technology
1 answer:
prohojiy [21]3 years ago
5 0

Answer:

line graph

Explanation:

the change in weight is linear

You might be interested in
How to improve and create beautiful graphic
kaheart [24]

Answer:

Learn OpenGL and any graphics rendering program.

Explanation:

3 0
3 years ago
Public class SomeClass { private String aName; private int aNumber; private boolean amAwesome; public SomeClass(String name, int
scoray [572]

Answer:

The objects created in the main method and their initial states are given below

Explanation:

The objects and initial state of each object( the values of each object’s variables) are thus:

We have objects awesome, amazing and fantastic.

initial state of awesome object is

aName = "Awesome"; aNumber = 5; amAwesome = true;

initial state of amazing object is

aName = "Amazing"; aNumber = -10; amAwesome = false;

initial state of fantastic object is

aName = "Fantastic"; aNumber = 11; amAwesome = true

3 0
3 years ago
Which tool did Adnan use to modify the image?
artcher [175]

Answer:

D

Explanation:

4 0
3 years ago
Read 2 more answers
You are joining a software company as a programmer. How are self-representation skills important in our job? How will you demons
skad [1K]
Self respresentation skills such as proper dress and punctuality demonstrate to a company that you will take your job seriously. It is important to meet deadlines and manage your time accordingly.
7 0
3 years ago
Read 2 more answers
What log file contains information and error messages regarding network access generated by daemons such as ssd and xinetd?
ehidna [41]

Answer:

The correct answer to the following question will be "Secure".

Explanation:

This file includes information about the rights of verification and authorization.

  • It will be used primarily for monitoring the use of authorization schemes.
  • It holds all communications related to safety like faults in encryption.
  • This also monitors sshd logins, logins of SSH, as well as other system security resources daemon-logged failures.

So, it's the right answer.

3 0
2 years ago
Other questions:
  • Florida convicted __________ people of DUI in a one-year period from 2009 to 2010.
    15·1 answer
  • They begin beating it with a hose to find out what it really means. How does the figurative language in this excerpt reveal Coll
    9·2 answers
  • (Business: check ISBN-10) An ISBN-10 (International Standard Book Number) consists of 10 digits: d1d2d3d4d5d6d7d8d9d10. The last
    9·1 answer
  • Please help!!
    8·1 answer
  • A ___describes a particular attribute of the dates item in a table​
    14·1 answer
  • Evonka is listening to music from an online music provider (such as Pandora or Jango). She builds a list of music preferences, i
    15·1 answer
  • .Choose the extention of Scratch Project<br><br><br> .sb2<br><br> jpeg<br><br> .exls
    5·2 answers
  • The term information technology was first used what year?
    15·2 answers
  • What steps can you take to secure your private information?.
    8·1 answer
  • Create a simple JavaScript calculator.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!