1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
melisa1 [442]
4 years ago
11

How do you put pictures in your questions?

Computers and Technology
1 answer:
faust18 [17]4 years ago
8 0

Answer:

there's a plus sign in the bottom right press it then another thing will pop up which looks like a clip then you press that

You might be interested in
Help, please!! A file named "games.txt" exists and has 80 lines of data. You open the file with the following line of code. aFil
Aliun [14]
I’m not 100% sure about this but I think it is A
8 0
4 years ago
Which of the following does not correctly declare an ArrayList?
kotegsom [21]

Answer:

Option b. ArrayList‹Integer› = new ArrayList‹Integer›(10) does not correctly declare an ArrayList.

<u>Explanation</u>:

ArrayList in Java dynamically stores elements in it. It also called as re- sizeable array as it expands  in size when elements are added and decreases when an element is removed from it. This array list class also allows to use duplicate and null values.

The syntax for creating Array list is as follows

ArrayList<Type> obj = new ArrayList<Type>()

Type  specifies the type of ArrayList like Integer, Character, Boolean etc, and obj is the object name. But in the option b ArrayList‹Integer› = new ArrayList‹Integer›(10)  object name is missed and not specified.

6 0
3 years ago
A Molex Connector that connects into a DVD player is easily identifiable by its
Usimov [2.4K]
By its 4 pin socket. ;) Hope this helps!
3 0
4 years ago
Read 2 more answers
What has been your background with using Windows-based computers?
Radda [10]

Answer:

Anything i desire.

Explanation:

4 0
3 years ago
Read 2 more answers
In implementing Security Life Cycle:__________
Dvinal [7]

Answer:

b) one needs to follow through all phases, assessment, design, deploy and manage security

Explanation:

The security life cycle is a process in which it involves the security artifacts for developing the software through a lifecycle. It contains a detailed plan that derives how to create an application form

At the time when the requirements and activity related to design is finished the next step is the software implementation. In this, the developers begins with the coding as per the requirements and designs discussed in the last step

Therefore according to the given options, the second option is correct

7 0
3 years ago
Other questions:
  • Windows 7 is used to run ____ software
    5·2 answers
  • 6. Which of the following options is used to view a computer's memory properties?
    8·1 answer
  • An algorithmic function that takes an input message of arbitrary length and returns an output of fixed-length is called a(n) ___
    10·1 answer
  • Emilio is reviewing the data he collected from historical records about immigration in the united states. He decides to create a
    5·1 answer
  • #5 Multiple Select Which of the following describes a hardware error? Select 3 options.
    7·2 answers
  • SHOW ALL YOUR WORK. REMEMBER THAT PROGRAM SEGMENTS ARE TO BE WRITTEN IN JAVA.
    13·1 answer
  • Please help ASAP!!! :))
    9·1 answer
  • 3) Controls on a form or report that describe each field—often the field name—in the underlying table
    7·1 answer
  • Compare and contrast sources and types of credit, including costs and benefits of installment
    15·1 answer
  • A combination of numbers and symbols used to express a calculation. Question 11 options: Formula Formula Bar Worksheet Workbook
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!