1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fredd [130]
2 years ago
15

Will mark brainliest! What does this code do? What kind of code is this called?

Computers and Technology
1 answer:
gavmur [86]2 years ago
3 0

Answer:

lol u can barly call this a code

Explanation:

its just a type error code i think

You might be interested in
SOMEONE PLEASE HELP ME I REPOSTED THIS 3 time and no ONE HAD HELPED ME
RoseWind [281]

Answer:

The answer is B

7 0
3 years ago
¿Cual es la ultima combinacion de celdas en Excel 365?
Furkat [3]
I need points but i don’t know so.
i really need points.
4 0
3 years ago
Companies that develop software for sale are called software ____.
yanalaym [24]
Hello <span>Loveworld4058 
</span><span>
Answer: Companies that develop software for sale are called software vendors.


Hope This Helps
-Chris</span>
4 0
3 years ago
Write a java program.
Sliva [168]

Answer:

The source code has been attached to this response. It contains comments explaining each line of the code. Kindly go through the comments.

To run this program, ensure that the file is saved as ArithmeticProcessor.java

Keep editing line 7 of the code to test for other inputs and arithmetic operation.

A sample output has also been attached to this response.

6 0
3 years ago
I gave brainlest .....!!!!​
expeople1 [14]

Answer:

me me me me me me me me me me mw

Explanation:

I hope I can help you

4 0
3 years ago
Other questions:
  • When you use the bufferedreader class, you must import the ____ package into your program?
    14·1 answer
  • 11.
    11·1 answer
  • HELP ASAP U GET BRAINLIEST
    15·2 answers
  • Which of these forms of multimedia would most likely contain both music and text:
    14·1 answer
  • Wireless attacks avoid the access points to limit detection. <br> a. True <br> b. False
    9·1 answer
  • Which of the following is the core communications protocol for the internet? telnet ftp tcp/ip ssl
    11·1 answer
  • How do networks help protect data?
    14·1 answer
  • Explain why it is important to follow a course or a program in keeping with your value system​
    13·1 answer
  • How was the Big Ben project similar to the investigation you conducted in class to determine if the table was vibrating? How is
    7·1 answer
  • What is the future of web development
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!