1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andreyandreev [35.5K]
3 years ago
14

What are the People that make the goods called

Computers and Technology
1 answer:
Marina CMI [18]3 years ago
4 0
Those people would be called producers
You might be interested in
Can someone help me out? I need to know what is 1 example of computer hacking?
cricket20 [7]
One way to know if someone is hacking you r computer is if you give them all the information about you. and they start texting and saying will you go n a date with me. And . then that person gets it and says: who is hacking into my computer. That is how you know someone  is hacking into your computer. The reason why is i saw a show who did that once. And plus I do my reasearch so I would know this anyway
6 0
4 years ago
An example of what you can post that shows kindness to other
harina [27]

Answer:

everybody is awesome

Explanation:

5 0
3 years ago
try the following code to see a nullpointer error (if you don’t see the error because of the autograding, you can copy it into t
gavmur [86]

Using the knowledge of computational language in JAVA it is possible to describe  since s is null, indexof throws an nullpointer error for s. comment out the first if statement and run the program again. the second if statement avoids the error with shortcircuit evaluation.

<h3>Writting the code:</h3>

<em>public class Printer {</em>

<em>    private String name;</em>

<em>    public void print() {</em>

<em>        </em><em>printString</em><em>(name);</em>

<em>    }</em>

<em>public class Example {</em>

<em />

<em>    public static void </em><em>main</em><em>(String[] args) {</em>

<em>        Object obj = null;</em>

<em>        obj.hashCode();</em>

<em>    }</em>

<em />

<em>}</em>

<em>    public static void </em><em>main</em><em>(String[] args) {</em>

<em>        Printer printer = new Printer();</em>

<em>        printer.print();</em>

<em>    }</em>

<em>}</em>

<em>    }</em>

<em>public class Example {</em>

<em />

<em>    public static </em><em>void </em><em>main(String[] args) {</em>

<em>        Object obj = null;</em>

<em>        obj.hashCode();</em>

<em>    }</em>

<em />

<em>}</em>

<em>    public static void </em><em>main</em><em>(String[] args) {</em>

<em>        Printer printer = new Printer("123");</em>

<em>        printer.print();</em>

<em>    }</em>

<em>}</em>

See more about python at brainly.com/question/19705654

#SPJ1

4 0
1 year ago
What is the scope of numC?
GREYUIT [131]

Answer:

local scope which is the entire body of the function/method that it is being used in

Explanation:

The variable numC has a local scope which is the entire body of the function/method that it is being used in, which in this scenario is the passwordMaker method. This is because the variable numC is being used as a parameter variable for that method, meaning that a piece of information is being inputted by when the method is called and saved as the variable numC which is then used by the lines of code inside the method, but cannot be accessed from outside the method thus.

5 0
3 years ago
Read 2 more answers
Which of these is used at testing/development stage?
maw [93]

Answer:

Which of these is used at testing/development stage?

A. compiler

B. interpreter

<u>C. JAVA </u>

D. Arduino

Hope this helps :)

Have a great day !

5INGH

Explanation:

3 0
4 years ago
Other questions:
  • Which is the term for a computer typically located in an area with limited security and loaded with software and data files that
    9·1 answer
  • What interprets software instructions and literally tells the other hardware devices what to do, based on the software instructi
    12·1 answer
  • What is the function of print format
    12·2 answers
  • Which statement best illustrates the relationship between three different
    12·1 answer
  • unittttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttt
    7·1 answer
  • Individuals and businesses have concerns about data security while using Internet-based applications. Which security risk refers
    7·2 answers
  • Kristi, an event planner, wants to store caterers’ names and contact information in an organized manner. Kristi will MOST LIKELY
    13·1 answer
  • The most common threats to your computer and your online safety come from what is called ____
    11·2 answers
  • When you add encryption to a powerpoint presentation what does it do
    14·1 answer
  • As data travels further over a wavelength or frequency, what goes down?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!