1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Deffense [45]
3 years ago
5

If you touch a downed powerline covered or bare, what's the likely outcome

Computers and Technology
1 answer:
ANEK [815]3 years ago
5 0

you would be shocked, it can even kill you

You might be interested in
The house had a wonderful pool of ... (his/its/our) own.​
-BARSIC- [3]

Answer:

its

Explanation:

"It" used in a number of different forms of sentences and has several rules. 'It' can be used in a sentence either for a Subject or an Object. It can be used as an introductory word in a sentence when there is no mention of the subject. It used for the singular, third-person pronoun. While it has many uses and according to the question, it is used to refer to a lifeless object (home).

6 0
3 years ago
Which of the following characters is not allowed for java variable names
Rainbow [258]
The variables must begin with a letter of the alphabet, a dollar sign or a underscore. After the first character you may add numbers as well. All special characters besides the dollar sign and underscore and not allowed in variables.
8 0
3 years ago
Security and protection as it relates to operating systems is grouped into four categories: Availability, Data integrity, Authen
Ivahew [28]

Answer:

The answer is "Confidentiality".

Explanation:

Data Security is also known as protection against unauthorized computer access, files, and pages through digital information protection. The protection of data also prevents data from bribery.  

  • It applies to both the security of data from unwanted entities being obtained.
  • It allows accessing sensitive data, which may be able to do so.
4 0
3 years ago
What is the output of this code? import java.util.HashSet; class A { public static void main(String[ ] args) { HashSet set = new
kompoz [17]

Answer:

The code will give an error that is "At least one public class is required in main file".

Explanation:

In the given code if we do not use the public access modifier to the class. It will give an error so, the correct code to this question as follows:

Program:

import java.util.HashSet; //import package

public class A  //define class as public.

{

   public static void main(String[ ] args) //define main method.

   {

       HashSet set = new HashSet(); //creating hashset object.

       set.add("A"); //add alphabet in hashset

       set.add("B"); //add alphabet in hashset

       set.add("C"); //add alphabet in hashset

       System.out.print("Size of HashSet is :"set.size()); //print the size of hashset.

   }

}

Output:

Size of HashSet is : 3

Explanation of the program:  

  • In the above program, we define a public class that is "A" and inside the class, we define the main method.  
  • Inside the main method, we create a HashSet class object that is "set".  
  • To add elements in HashSet we use add() function that adds elements and in the last, we use the size() function that prints the size HashSet.
5 0
3 years ago
14. The Internet may best be compared to a/an
finlep [7]
From that particular list, the item that best compares to the internet
is B. a large network of roads.
7 0
3 years ago
Read 2 more answers
Other questions:
  • Casting is one of the oldest known manufacturing processes. <br> True or false
    6·2 answers
  • Please help
    14·1 answer
  • A ________ is a collection of forms, reports, queries, and programs that serves as an intermediary between users and database da
    6·1 answer
  • In the Advent of computer technologies and it's applications, to what extent these technologies have influenced the world.
    11·1 answer
  • When you are working in Performance Monitor, in the "Add Counters" dialog box, and need more information about a particular coun
    8·1 answer
  • Hi need help on this <br> what is cyberspace
    14·1 answer
  • WILL GIVE BRAINLIEST!!!!!!!
    10·2 answers
  • How does social network use message to entertain?
    14·1 answer
  • In order to get the maximum functionality out of a device that is plugged in, a user should download the specific ___ for that d
    10·2 answers
  • Where to store <br> ammunition
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!