1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ale4655 [162]
3 years ago
14

a ____ is a feature that finds a list potential design problems associated with your document brainly.com

Computers and Technology
1 answer:
andrezito [222]3 years ago
8 0
1. eliminating some diseases
2. improving certain species (like growing bigger apples)

You might be interested in
Why are GUI operating system more popular than CUI operating system these days?​
julsineya [31]

Answer

GUI operating system are more popular than CUI operating system because the GUI operating system is easy to use and understand because commands are graphically presented.They support extra devices and multimedia system.They support network and internet fully.They are multiuser,multitasking operating system.eg windows.

Explanation:

Hope it helps you

8 0
3 years ago
When defining a class, it is a best practice to declare ____ as private. constructors mutators nothing should be private accesso
katrin [286]

Answer:

The answer is "variables".

Explanation:

It is necessary to declare a variable privately when declaring a class because the private variable 'protects' the code while it is in operation. It may not aim to protect it at this stage from changing the codes themselves for other developers. Its purpose of the so-called "data hiding" is to hold the internal data from many other classes using the class protected.

6 0
3 years ago
Draw a full binary tree of height 2. How many nodes does it have?
Paraphin [41]

Answer:

The number of nodes in a full binary tree of height 2 = 7

Explanation:

At each level k, of the full binary tree there are usually 2^{k} \\ nodes.

So the full binary tree of height 2 has nodes= 2^{0} \\ + 2^{1} \\ + 2^{2} \\.

which is 7.

6 0
4 years ago
Where would you go to access frequently used icons?
trapecia [35]

Answer:

b

Explanation:

4 0
3 years ago
Read 2 more answers
What type of malware actually evolves, changing its size and other external file characteristics to elude detection by antivirus
Free_Kalibri [48]

Answer:

This type of malware are called Polymorphic Malware.

6 0
3 years ago
Other questions:
  • Which part of color theory deals with how colors on a web page relate to each other?
    11·2 answers
  • Need answer quick
    9·1 answer
  • You have been hired to set up a network for XYZ Enterprises. What factors will you consider to determine the type of network nee
    7·2 answers
  • Which magazine loved their alienware test pc so much they didn't want to send it back?
    11·1 answer
  • Which types of files can be used to define Kubernetes manifest files? yaml, json, yaml and text files
    5·1 answer
  • Pleases Help ME An example of a _________________ impact is when a product is back ordered and the business contacts the custome
    5·1 answer
  • Could u help me on this u just have to compare how its alike please help ​
    5·2 answers
  • How do you write a multiplication formula in excel with an absolute refrence?
    11·1 answer
  • True or False? Threat modeling is the practice of identifying and prioritizing potential threats and security mitigations to pro
    9·1 answer
  • of the choices listed, which is the correct protocol to access a remote computer and execute commands?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!