1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ANTONII [103]
3 years ago
7

Which of these best represents a call to action?

Computers and Technology
2 answers:
polet [3.4K]3 years ago
8 0

Answer:

d

Explanation:

d just did it

Nuetrik [128]3 years ago
4 0
Answer: B
A call to action is an invitation for a user to take some desired action, used all the time in the marketing world.
You might be interested in
Write a statement to create a Google Guava Multimap instance which contains student ids as keys and the associated values are st
Sergeu [11.5K]

Answer: provided in the explanation section

Explanation:

Note: take note for indentation so as to prevent error.

So we import com.google.common.collect.Multimap;

import java.util.Collection;

import java.util.Map;

class Main {

   public static void main(String[] args) {

       // key as studentId and List of Profile as value.

       Multimap<String,Profile> multimap = ArrayListMultimap.create();

       multimap.put("id1", new ExamProfile("examStudentId1"));

       multimap.put("id1", new ELearningProfile("userId1"));

       multimap.put("id2", new ExamProfile("examStudentId2"));

       multimap.put("id2", new ELearningProfile("userId2"));

       // print the data now.

       for (Map.Entry<String, Collection<Profile>> entry : multimap.entrySet()) {

           String key = entry.getKey();

           Collection<String> value =  multimap.get(key);

           System.out.println(key + ":" + value);

       }

   }

}

// assuming String as the studentId.

// assuming Profile as the interface. And Profile can multiple implementations that would be

// specific to student.

interface Profile {

}

class ExamProfile implements Profile {

   private String examStudentId;

   public ExamProfile(String examStudentId) {

       this.examStudentId = examStudentId;

   }

}

class ELearningProfile implements Profile {

   private String userId;

   public ELearningProfile(String userId) {

       this.userId = userId;

   }

}

This code is able to iterate through all entries in the Google Guava multimap and display all the students name in the associated students profile.

8 0
4 years ago
Thanks for asking me to ask a ques !!
Tamiku [17]

Answer:

I'm not sure what this means by Hope you have a great day :)

5 0
4 years ago
Given an int variable datum that has already been declared, write a few statements that read an integer value from standard inpu
Zina [86]

Answer:

Following are the  Statement in the Java Language .

Scanner out = new Scanner( System.in); // creating the object

datum = out.nextInt(); // Read the integer value bu using the instance of scanner class

Explanation:

In the Java Programming Language The scanner class is used for taking the user input from the standard input The definition of scanner class is java.util package means that if you taking the input by using scanner class firstly importing the predefined package i.e Java.util.

The description of the above code is given below

  • Scanner out = new Scanner( System.in);: This statement created the instance "out" of the scanner class which is used for taking the input.
  • datum = out.nextInt(); : This statement taking the integer input and store them into the datnum variable.
3 0
4 years ago
Every nic has a unique address that consists of a 12-digit hexadecimal value. what is this address called?
Lyrx [107]
That address is called the MAC address 
6 0
4 years ago
Sara is a college student studying accounting. She uses a laptop daily for personal and course work. What data might Sara have o
polet [3.4K]

Answer:

Sara: Personal data

Jorge : Personal data + official data.

Wanda: Personal data + students data

Carl: Personal data + official data

Explanation:

Personal data could contain pictures, social security numbers, banking transactions details, passwords, credit card information etc.

Jorge's official data could contain information about various sources that he gets his news from. It could contain password information about his official email. And he connects to the office network, he might pose a threat to the entire network if his PC is infected.

Wanda could leak the student's information. She could also leak her social security numbers, bank details, organization's details etc.

Carl could leak company's information. He can avoid it by staying away from public networks. Installing anti-virus. He should also take great care while accessing various sites and never download harmful files over the internet.

8 0
3 years ago
Other questions:
  • What does input mean in the universal systems model
    14·1 answer
  • Can i use both PLA and TPE or TPU for a single unit 3d printed prototype?
    13·1 answer
  • PLEASEEEE HELPPP
    8·1 answer
  • . What are the disadvantages of using small, fixed-length cells in ATM?
    13·2 answers
  • ____ is a consistent relational database state in which every foreign key value also exists as a primary key value.​ a. ​ Refere
    11·1 answer
  • Which technique emphasizes the participative development among system owners, users, designers, and builders?A) Rapid applicatio
    11·1 answer
  • Match each code snippet to its appropriate markup language name. XML CSS HTML XHTML<br><br><br>​
    10·1 answer
  • Write a program that reads an integer, a list of words, and a character. The integer signifies how many words are in the list. T
    6·1 answer
  • Debate whether social networking is harmful or helpful to society.
    5·1 answer
  • which two host names follow the guidelines for naming conventions on cisco ios devices? (choose two.)
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!