1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ne4ueva [31]
3 years ago
7

HEY DO U LIKE TRAINS!

Computers and Technology
1 answer:
Triss [41]3 years ago
3 0

Answer:

yes

Explanation:

yes

You might be interested in
Select the correct category of cybersecurity described.
Shalnov [3]

Answer:

Network security

Explanation:

Network security is a category of cybersecurity that is related to the protection of the infrastructure of the computer network from unauthorized access and intrusion that may be from intended attack or from an expedient  program which may result in the modification, malfunctioning, misuse or unacceptable disclosure of the network and the contents of the network

The category of cybersecurity that 'prevents intruders from accessing, misusing, destroying, adapting, or improperly disclosing networks, network infrastructure, or the information contained within networks' is network security.

6 0
3 years ago
Determine the best access modifier for each of the following situations: a. A class Employee records the name, address, salary,
Lorico [155]

Answer:

a. Protected

b. Public

Explanation:

There are four acess modifier in Java.

Default: Acessible only within the same package.

Public: Can be acessed by any class.

Private: Acessible only within the class.

For example, you have a class employee and a private method. This method can only be accessed by an object that is an instance of an employee.

Protected: Used in classes that extend each other. For example, a class of employees would extend employee.

So:

a. A class Employee records the name, address, salary, and phone number.

The best acesses modifier is protected. A class may extended employee but have the same arguments(name, adress, salary, phone number), so it should also have acess to the method.

b. An adding method inside of a class BasicMath.

This method can be used in a variety of packages and projects and classes... and there is no important information regarding security. So the best method is public.

4 0
3 years ago
Write a program that prints the U.S. presidential election years from 1792 to present day, knowing that such elections occur eve
Naddika [18.5K]
Year = 1972
current year = 2021

while year <= current year:
print (year)
year = year + 4
8 0
2 years ago
Which were important characteristics of Sparta's government? Select the two correct answers. A. Oligarchs were able to hold a lo
Cerrena [4.2K]

Answer:

Sparta's government was a combination of a monarchy, a democracy, and an oligarchy. and oligarchs were able to hold a lot of power in government.

Explanation:

Spartans government loved to have power more than anyone in their century.

4 0
3 years ago
Read 2 more answers
Identify and describe the four fundamental configurations that are the basis of most Windows printer deployments and describe ho
pav-90 [236]

Answer:

The four fundamental configurations include:

  1. Direct Printing
  2. Network Attached printing
  3. Locally Attached Printer Sharing
  4. Network Attached Printer Sharing

Explanation:

  • Direct Printing includes an independent device for printing and independent computer.
  • In Network Attached Printing clients use TCP to send their jobs to the printing devise while being in a network.
  • In Locally Attached Printer Sharing, the print device is shared among all the  clients in a network while the computer or device connected with printer acts as a server.
  • In Network Attached Printer Sharing the computer on the network acts as server while printer clients send the commands to printer server which are processed by print device after spooling.
<h2>Flexibility to windows:</h2>

Now these configuration add a lot of flexibility to windows printing by generating a server-client model, the printer can be shared among may of the clients as well as a single command can be run for a print among all the users or specific ones in a network. This can also benefit by less time consumption.

5 0
3 years ago
Other questions:
  • Which result would support the particle theory of light?
    6·2 answers
  • Data administration is a special organizational function that manages the policies and procedures through which data can be mana
    9·1 answer
  • Approximately what percentage of the world population owns a smartphone?
    9·1 answer
  • They begin beating it with a hose to find out what it really means. How does the figurative language in this excerpt reveal Coll
    9·2 answers
  • Given the function definition below, what is the effect of thecall:
    7·2 answers
  • 2. What is the layout of the modern keyboard known as?
    13·1 answer
  • You use the Paste Options button labeled ____ if you want the pasted chart not to be linked to the source document and you want
    13·2 answers
  • For an alternative to the String class, and so that you can change a String's contents, you can use_________ .
    12·1 answer
  • Technology can cause a drop in input costs.<br> a. True<br> b. False
    6·2 answers
  • Name the tools in plant propagation.<br>Q<br>18.<br>16.<br>17.<br>19.<br>20.<br>please po asap​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!