1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mash [69]
3 years ago
5

Jim wants to buy a car, but he’ll probably only need it for a couple of years. He has a short commute to work, so he won’t be pu

tting many miles on his vehicle. What’s the best transportation option for Jim
Computers and Technology
1 answer:
aalyn [17]3 years ago
4 0
The best is bus or walking
You might be interested in
Discuss how advertising on the Web affects search results and the ethical dilemmas associated with it.
Rus_ich [418]
Lag and loops because some ads are programmed  to work that way. 
idk im not a professional
6 0
3 years ago
Another name for the office button menu is the toolbar. true or false.
levacccp [35]
This statement is true im sure of it
8 0
3 years ago
Read 2 more answers
You need a collection to represent secret agents. Every agent has a unique codename that identifies them, and an Agent object th
Scrat [10]

Answer:

A  HashMap< String, Agent >

is a best collection for this

Explanation:

Collection is basically a framework that is used in order to perform operations on data and to store and manipulate objects.

HashMap is a Map based collection where Map is a data structure of interface which allows the key and value pairs mapping and HashMap is a collection class used to store these key-value pairs of data.

The syntax is:

HashMap<key, value>

So in  HashMap< String, Agent > statement the String is used to store the codename for every agent and Agent is an object that represents each agent. So this is represented as key-value pair using HashMap.

4 0
4 years ago
A user logging on, an application server connecting to a database server, an authentication server rejecting a password, or an a
ser-zykov [4K]
<span>The answer is Event.  A user logging on, an application server connecting to a database server, an authentication server rejecting a password, or an antivirus scanner reporting a suspected virus are all examples of Event.
</span>
4 0
4 years ago
Jason takes many photographs on his smartphone while on vacation in italy. If jason wants to access these pictures across multip
White raven [17]

Answer:

Probably in the cloud, or online, like G Photos

8 0
2 years ago
Other questions:
  • GUI stands for "___ user interface."
    9·2 answers
  • Add three methods to the Student class that compare twoStudent objects. One method should test for equality. A second method sho
    13·1 answer
  • For the client-server application over TCP, why must the server program be executed before the client program? For the client se
    13·1 answer
  • Complete the second clause of the following Prolog program for member/2 where member(X, Y) checks whether X is an element (a mem
    7·1 answer
  • Someone who wants to learn a skilled trade on the job should consider
    6·2 answers
  • When working in Photoshop with the move tool, you can select multiple layers and use this option to arrange them into a straight
    7·2 answers
  • A key tactic that is used in many attacks, but very frequently in CEO Fraud, is creating a sense of what?
    15·2 answers
  • True or False: Variablename must start with a number.
    13·1 answer
  • When determining how much money to borrow in loans to pay for your higher education, which of the following items should not be
    5·1 answer
  • What kind of company would hire an Information Support and Service employee?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!