1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BaLLatris [955]
3 years ago
8

Able to make a survey form using VB (Visual basics 6.0) to represent ways of conservation of

Computers and Technology
2 answers:
Nadusha1986 [10]3 years ago
6 0
40 is the right answer
sp2606 [1]3 years ago
6 0
The correct answer is 40
You might be interested in
I NEED SOME MAJOR HELP W/ THIS!!! PLSSS. WHOEVER HELPS GETS 80 POINTS!!! I NEED IT DONE SOON! TYY <3;)
Oksanka [162]

Answer:

I probably won't awnser them all but I'll try my best

Explanation:

Hacking is a breach of privacy online usually caused by some kind of malware injected into your device there's multiple types of this program or files malware which simply damages and harms your device. A Trojan horse is a program which tricks you by selling you a fake product which has code in it which has code which gives the hacker remote access to your device this program is usually free and masked like a crack or patch of a certain program. U got the second an third question with this one so u can just divide it into pieces. Piracy is Hacking but this time the hacker is stealing ur information through the malware. Invasion of privacy can have multiple forms online and offline. Online intrusion is when a service gives out information you entrust to it while off line Intrusion is stalking trespassing blackmail etc.

4 0
3 years ago
Structured walk-throughs take place throughout the SDLC and are called _____ reviews, depending on the phase in which they occur
Tpy6a [65]

Answer:

design

Explanation:

Based on the information provided within the question it can be said that these are called design reviews. This is one of the most important parts of the development of a system. This focuses more on answering how something is going to be done in the system as opposed to answering what is going to be done for the system depending on the questions asked in the analysis phase.

5 0
3 years ago
Which string method returns true if the character is a lowercase letter?
Llana [10]
The right answer is : is.lower(letter)
8 0
3 years ago
Which of the following is the most reliable way to check the accuracy of a website? Examine the sources cited by the website.
Nadusha1986 [10]

Answer: It looks like you only have one answer choice that was added in your question, but that is the correct answer.

3 0
3 years ago
Write a program to help a local restaurant automate its breakfast billing system. The program should do the following:
Maurinko [17]

Answer:

Please find the code and its output in the attached file:

Explanation:

In this code a structure "menuItemType" is defined that declared float and integer variable and outside the structure its list type variable "menuList" is defined that holds and calculates its value.

In the next step, a class "Rest" is defined, and inside the class a method "getData", "showMenu", and "printCheck" is defined, in which the above methods uses the switch for input and calculate the value and the last "printCheck" calculates the Tax and Amount Due value.

In the main method, a class object is created that prints message and call the above method.

6 0
3 years ago
Other questions:
  • On the home ribbon, what do you use to change the font size of characters in a cell
    9·1 answer
  • Assume that aList is a valid ArrayList containing the following:
    8·1 answer
  • Which of the following is something you need to keep an eye out for
    7·2 answers
  • The primary difference between a DVD and a CD is that one is read and written using optics while the other uses magnets.
    12·2 answers
  • What is Human Dignity
    12·1 answer
  • Which of the following are advantages of a local area network, as opposed to a wide area network? Select 3 options.
    8·1 answer
  • WILL GIVE BRAINLIEST
    5·2 answers
  • Several programmers write individual code modules that are used for different processes in a vehicle. Individual tests have alre
    13·1 answer
  • HELP WILL GIVE BRAINLIEST !!!!!
    6·1 answer
  • (2 points) starting from the root node, we want to populate a bst with the keys in a given list without altering the key order.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!