1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lapatulllka [165]
2 years ago
7

WHo ever is the first one to subsccribe to my you-tube channel gets brainliest

Computers and Technology
1 answer:
fgiga [73]2 years ago
3 0

Answer:

uhm k

Explanation:

free copy and paste ☏ ♡ ☆⋆◦★◦⋆°*•°

. * . . ° . ● ° .

¸ . ★ ° :. . • ° . * :. ☆

° :. ° .☆ . ● .° °★

★ ★°★ . * . °☆ . ● . ★ ° . • ○ ● . ☆ ★ ° ☆ ¸. ¸ ★ . • ° . *

¸ . ★ ° :. :. . ¸ . ● ¸ ° ¸. * ● ¸ °☆

☆ °☆ . * ● ¸ . ★¸ .

. * . . ° . ● ° .

° :. ° . ☆ . . • . ● .° °★ Not sure how to copy and paste? Just right click your mouse and choose copy in options, to release repeat the process and just paste it. No mouse? Select the text with your computer pad and use ctrl c to release, ctrl v. On mobile? Press on your screen and select the text, use the option copy and paste wherever you would like!

You might be interested in
Select four tasks associated with operating system maintenance. Cleaning inside the computer Defragmenting the hard drive Deleti
hram777 [196]

Answer:

Cleaning inside the computer

Defragmenting the hard drive

Deleting temporary files

Organizing data

Explanation:

7 0
2 years ago
Which of these Logic Statement's are correct for the following diagram? *
Solnce55 [7]

Answer:

A AND B OR C

Explanation:

7 0
2 years ago
CIST 1122 Project 2 Instructions
NikAS [45]

Answer:

it is suppost ro be at

least 20 tb

Explanation:

5 0
2 years ago
_______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the
postnew [5]

Answer: Computers as target

Explanation:

Whenever an authorized  access is made into a system it is a form of crime and it is called computers as target whereby one is able to access the system and get hands on unauthorized data and can also manipulate various activities which will have many dangerous effects.

8 0
3 years ago
Define function print_popcorn_time() with parameter bag_ounces. If bag_ounces is less than 3, print "Too small". If greater than
Gnoma [55]

Answer:

public static void print_popcorn_time(int bag_ounces){

       if(bag_ounces<3){

           System.out.println("Too Small");

       }

       else if(bag_ounces>10){

           System.out.println("Too Large");

       }

       else{

           bag_ounces*=6;

           System.out.println(bag_ounces+" seconds");

       }

   }

Explanation:

Using Java prograamming Language.

The Method (function) print_popcorn_time is defined to accept a single parameter of type int

Using if...else if ....else statements it prints the expected output given in the question

A complete java program calling the method is given below

public class num6 {

   public static void main(String[] args) {

       int bagOunces = 7;

       print_popcorn_time(bagOunces);

   }

   public static void print_popcorn_time(int bag_ounces){

       if(bag_ounces<3){

           System.out.println("Too Small");

       }

       else if(bag_ounces>10){

           System.out.println("Too Large");

       }

       else{

           bag_ounces*=6;

           System.out.println(bag_ounces+" seconds");

       }

   }

}

3 0
3 years ago
Other questions:
  • Write a program that does the following: • Alphabetizes a list of small (non-capital) letters. For consistency, make the string
    14·1 answer
  • Of which of the following devices are point, drag, and click actions?
    15·1 answer
  • Select the correct answer
    11·1 answer
  • Referential integrity states that:______.
    15·1 answer
  • Which of the following payment types require you to pay upfront?
    9·1 answer
  • The need to strike a<br>- among work, life, family, and other responsibilities is<br>universal.​
    15·1 answer
  • Match each career to its various job roles. digital media coordinator digital media specialist photographer sound producer creat
    13·1 answer
  • What do you consider to be the next big thing in "Small Systems" (technology, hardware, software, etc.) and why?
    10·1 answer
  • Is pseudocode obtained from Algorithm or is Algorithm obtained from pseudocode?
    8·1 answer
  • STM-1 contains 63 primary 2-Mbps data streams and each of them contains 30 time slots for speech.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!