1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Margarita [4]
3 years ago
11

What year did windows release

Computers and Technology
1 answer:
sesenic [268]3 years ago
4 0

Answer:

1985

Explanation:

Bill Gates launched Microsoft in November of 1985.

You might be interested in
ANYBODY WANNA PLAY FoRnITe
ValentinkaMS [17]

Answer:

No but my baby brother can play with u

6 0
3 years ago
Read 2 more answers
____ is the encapsulation of method details within a class.
Anestetic [448]

Implementation hiding i<u>s the encapsulation of method details within a class</u>. Implementation can be interpreted as those specifications which can be altered without altering the correctness of an application. Wrapping data/methods within classes (descriptions of the way all objects of this type will look/act) in combination with implementation hiding is called encapsulation. Information users need to know about behaviors should be available without dependence on implementation specifications.

6 0
3 years ago
Melissa is writing a class called Cell. Which method has she set up to return a double?
Alina [70]

Answer:

C. public double get_mCount()

5 0
3 years ago
Each Google My Business location has a unique ID that applies changes to the right listing.
Soloha48 [4]

Answer:

The correct answer to the following question will be option c. Store Code.

Explanation:

A store code will be the unique ID which can uniquely identify any location of that store.

  • Any random number or name can be the store code.
  • A store code in each Google My Business (GMB) will only be viewable to the person who is managing that locations arround the store.
  • Any costumer doesn't have possibility to see it.

Hence, Option C is the right answer.

6 0
3 years ago
An organization’s IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the
emmasim [6.3K]

Answer:

The correct answer is (a) Remove the affected servers from the network.

Explanation:

Solution:

Now, since the organisation top priority is more of  containment over eradication, an outbreak code that is hostile as an can be suppressed effectively by removing the web server completely from the over all network facilities or infrastructure.

Also, if the affected servers are not removed, it might affect the integrity, confidentiality of sensitive materials or documents which will be exposed to the outside world by the attacker.

4 0
3 years ago
Other questions:
  • Which date formats are allowed in Excel for February 14, 2018? Check all that apply.
    15·2 answers
  • A potential threat to administrators’ ability to manage the correctional system is
    12·1 answer
  • When working on developing an ability, it is important to get feedback to know how you are doing.
    6·1 answer
  • How do I write the yearly salary for something without copying it word for word? I'm doing a PowerPoint ( which you had to choos
    15·1 answer
  • Technology trends in education play a key role in a student’s
    15·1 answer
  • What is data? why is it important to collect data ? explain the points.​
    10·1 answer
  • What is the meaning of antimonographycationalis​
    9·2 answers
  • Which term describes a visual object such as a picture, a table, or a text box?
    14·2 answers
  • I connected to an external hard drive to transfer some photos from my vacation. When I try to drag the photo, it bounces right b
    14·1 answer
  • ________________, _______________ and ___________ are what you see when you open Excel
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!