1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Shkiper50 [21]
3 years ago
12

Rate my dog out of ten give explanation why

Computers and Technology
1 answer:
Karolina [17]3 years ago
7 0

Answer:

10/10

Explanation:

i love dogs. he's a super cute dog and i love him without even knowing him

You might be interested in
Which security measure provides protection from IP spoofing?
anyanavicka [17]

Answer:

An SSL also provides protection from IP spoofing.

8 0
3 years ago
Suppose you've decided to write a function template that you expect to use in many different source files. Suppose, further, tha
Sladkaya [172]

Answer:

The Solution to the given question can be defined as follows:

Explanation:

Please find the complete question in the attachment file.

In this case, the compiler will try to correct the model type by both the form we used when we try and call the method with both the appropriate form variable. It type of function. Consequently, unless the function in another file is specified, the compiler cannot locate the digital strategy. The point to note here is that only when this code is used, the template code shall be compiled.

The construct component will therefore be efficient so in this case, its connection stage would fail. An undefined connection to the feature <function name> can constitute a possible error in this case. It rules, therefore, address the construction project problem. Furthermore, the template function throughout the main program is generally recommended. It can be solved alternatively because parameters of a template like <function name><type> could be specified throughout the CPP file.

8 0
3 years ago
Which of the following best describes the protocols used on the Internet?
sergejj [24]

Answer:

Common Internet protocols include TCP/IP (Transmission Control Protocol/Internet Protocol), UDP/IP (User Datagram Protocol/Internet Protocol), HTTP (HyperText Transfer Protocol) and FTP (File Transfer Protocol).

8 0
4 years ago
Implement a class Rectangle. Provide a constructor to construct a rectangle with a given width and height, member functions get_
lara [203]
<h2>Answer:</h2>

//class declaration

public class Rectangle{

   

   //declare the instance variables - width and height

   double width;

   double height;

   

   

   //the <em>constructor</em>

  public Rectangle(double width, double height){

       

       //initialize the width of the rectangle

       this.width = width;

       

       //initialize the height of the rectangle

      this.height = height;

       

   }

   

   

   //method <em>get_perimeter</em> to compute the perimeter of the rectangle

   public double get_perimeter(){

       

       //compute the perimeter

       //by using the formula 2(width + height)

      double perimeter = 2*(this.width + this.height);

       

       //return the perimeter

       return perimeter;

   }

   

   //method <em>get_area</em> to compute the area of the rectangle

   public double get_area(){

       

       //compute the area

       //by multiplying the width and height of the rectangle

       double area = this.width * this.height;

       

       //return the area

      return area;

   }

   

   

   //method <em>resize</em> to resize the rectangle

   public void resize(double factor){

       

       //resize the width of the rectangle

       //by multiplying the width by the factor

       this.width = this.width * factor;

       

       //resize the height of the rectangle

       //by multiplying the height by the factor

      this.height = this.height * factor;

     

   }

   

}  //end of class declaration

<h2>Explanation:</h2>

The code above has been written in Java. In contains comments explaining every part of the program.

3 0
3 years ago
A computer can read whatever you type into it.<br> A)True<br> B)False
motikmotik

Answer:

True

Explanation:

Everything typed into a computer is saved as data and logged.

3 0
3 years ago
Read 2 more answers
Other questions:
  • What is occurring when an attacker manipulates commonplace actions that are routinely performed in a business?
    6·1 answer
  • What is the definition of the components that motherboards, ssds, processors, and cases are part of?
    10·1 answer
  • Why were computer users excited by the introduction of the first Macs?
    14·1 answer
  • Conventional prescription eyeglasses are considered sufficient PPE for eye protection. A) True B) False
    11·1 answer
  • How do we call a very small video,that is repeating unlimitedely
    10·2 answers
  • What is Automation ? Please give an example ?
    14·1 answer
  • What is the output of the following code<br> X = 06<br> y = 0<br> print (x ** y)
    12·1 answer
  • In order to restrict editing to a document, a user will go to Review, , Restrict Editing, and will then select what kinds of edi
    12·1 answer
  • What is the purpose of the Zoom dialog box? to put the selected range in ascending order in a query to put the selected range in
    13·2 answers
  • Which type of data storage allows computers to read and write to the memory while the computer is powered on?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!