1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
algol [13]
3 years ago
5

Who would win in a fight iron man or bat man​

Computers and Technology
2 answers:
MatroZZZ [7]3 years ago
8 0
IRON MANNNN MARVELLLL
dmitriy555 [2]3 years ago
8 0

WWhile we have already covered the fact that Bruce Wayne is physically stronger than Tony Stark, he is also a much better fighter. Iron Man tends to rely upon his weapons where possible, Batman focuses on his fighting abilities, which would give him the edge in a brawl with the MCU hero.

heres your answer lol

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

You might be interested in
Interactivity and Blank______ are two important capabilities of the Internet in the Blank______ relationship.
ANTONII [103]

Interactivity and individuality are two important capabilities of the Internet in the buyer-seller relationship.

<h3>What is  individuality?</h3>

The Definition of the term individuality connote the full character that is specific to and set apart a person from another.

Note that Interactivity and individuality are two important capabilities of the Internet in the buyer-seller relationship.

Learn more about individuality from

brainly.com/question/18405002

#SPJ1

4 0
2 years ago
A major way the National Information Infrastructure Protection Act of 1996 amended the Computer Fraud and Abuse Act was the subs
Kaylis [27]

A major way the National Information Infrastructure Protection Act of 1996 amended the Computer Fraud and Abuse Act was the substitution of the term <u>protected </u>computers for federal interest computers so that the statute now protects any computer attached to the Internet.

<h3>What is the National information infrastructure protection act?</h3>

It is an amendment act of Computer Fraud and Abuse Act and was enacted in 1996. The act is for the cyber crimes and frauds.

Thus, the correct option is protected.

Learn more about National information infrastructure protection act

brainly.com/question/13371540

#SPJ1

3 0
2 years ago
Design an application for Bob's E-Z Loans. The application accepts a client's loan amount and monthly payment amount. Output the
zmey [24]

Answer:

part (a).

The program in cpp is given below.

#include <stdio.h>

#include <iostream>

using namespace std;

int main()

{

   //variables to hold balance and monthly payment amounts

   double balance;

   double payment;

   //user enters balance and monthly payment amounts

   std::cout << "Welcome to Bob's E-Z Loans application!" << std::endl;

   std::cout << "Enter the balance amount: ";

   cin>>balance;

   std::cout << "Enter the monthly payment: ";

   cin>>payment;

   std::cout << "Loan balance: " <<" "<< "Monthly payment: "<< std::endl;

   //balance amount and monthly payment computed

   while(balance>0)

   {

       if(balance<payment)    

         { payment = balance;}

       else

       {  

           std::cout << balance <<"\t\t\t"<< payment << std::endl;

           balance = balance - payment;

       }

   }

   return 0;

}

part (b).

The modified program from part (a), is given below.

#include <stdio.h>

#include <iostream>

using namespace std;

int main()

{

   //variables to hold balance and monthly payment amounts

   double balance;

   double payment;

   double charge=0.01;

   //user enters balance and monthly payment amounts

   std::cout << "Welcome to Bob's E-Z Loans application!" << std::endl;

   std::cout << "Enter the balance amount: ";

   cin>>balance;

   std::cout << "Enter the monthly payment: ";

   cin>>payment;

   balance = balance +( balance*charge );

   std::cout << "Loan balance with 1% finance charge: " <<" "<< "Monthly payment: "<< std::endl;

   //balance amount and monthly payment computed

   while(balance>payment)

   {

           std::cout << balance <<"\t\t\t\t\t"<< payment << std::endl;

           balance = balance +( balance*charge );

           balance = balance - payment;

       }

   if(balance<payment)    

         { payment = balance;}          

   std::cout << balance <<"\t\t\t\t\t"<< payment << std::endl;

   return 0;

}

Explanation:

1. The variables to hold the loan balance and the monthly payment are declared as double.

2. The program asks the user to enter the loan balance and monthly payment respectively which are stored in the declared variables.  

3. Inside a while loop, the loan balance and monthly payment for each month is computed with and without finance charges in part (a) and part (b) respectively.

4. The computed values are displayed for each month till the loan balance becomes zero.

5. The output for both part (a) and part (b) are attached as images.

4 0
3 years ago
What does the following code do? Assume list is an array of int values, temp is some previously initialized int value, and c is
BigorU [14]

Answer:

Option D is correct.

Explanation:

Option D is correct because  when the condition  if (list[j] < temp) is tested it only gets true when element in list[] array at <em>jth</em> position is less than the value in <em>temp</em> and after that it increments the value of c by this statement: c++ and so c is incremented from 0 to as much times as much elements in list[] are lesser than temp.

6 0
4 years ago
Read 2 more answers
Complete the sentence.<br> Python is a_____<br> level language compared to bytecode.
Crazy boy [7]

Answer:

High

Explanation:

Python is high level; Bytecode is intermediate

5 0
3 years ago
Read 2 more answers
Other questions:
  • A bank system mainframe is struck by a DDoS attack and goes offline. Customer’s cannot log on to their accounts. Which element o
    11·1 answer
  • 1.   Which of the following is an example of a primary cost of an accident or injury?
    5·2 answers
  • _____ is a software delivery approach in which an organization outsources the equipment used to support its data processing oper
    5·1 answer
  • A _____ attack is designed to generate a lot of activity on a network by flooding it with useless trafficenough traffic to overw
    14·2 answers
  • Four categories of installer apps
    13·1 answer
  • You are network administrator for an Active Directory forest with a single domain. Then network has three sites with one domain
    12·1 answer
  • The person that includes the most and funniest memes (screenshot from the web) gets brainliest.
    5·1 answer
  • PLS HELP
    8·2 answers
  • In a computer-controlled greenhouse, a temperature sensor and a window motor are connected to the computer.
    10·1 answer
  • Cidr simplifies how routers and other network devices need to think about the parts of an ip address, but it also allows for mor
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!