1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vesna_86 [32]
3 years ago
15

After adjusting for inflation, the first personal computer would have cost __________ by today’s standards. A. $1,200 B. $2,100

C. $10,200 D. $21,000 Please select the best answer from the choices provided A B C D
Computers and Technology
2 answers:
lakkis [162]3 years ago
4 0

it is C because it is

zhannawk [14.2K]3 years ago
3 0

Answer:

c. $10,200 is the correct answer

You might be interested in
After saving the changes she made, Sally notices that she used the word "home” too many times in her paragraph. She decides to m
Natasha_Volkova [10]

Answer:

c or a there both correct

Explanation:

8 0
4 years ago
Which of the following class definition defines a legal abstract class Group of answer choices public class Rectangle abstract {
valkas [14]
<h2>Question</h2>

Which of the following class definition defines a legal abstract class Group of answer choices

(a)

public class Rectangle abstract {

   public abstract double findArea ( );

   

}

(b)

public abstract class Rectangle {

   public abstract double findArea ( );

   

}

(c)

public class Rectangle {

   public abstract double findArea ( );

   

}

(d)

public class abstract Rectangle {

   public abstract double findArea ( );

   

}

<h2>Answer:</h2>

(b)

public abstract class Rectangle {

   public abstract double findArea ( );

}

<h2>Explanation:</h2>

When a class is declared with the abstract keyword, the class is called an abstract class. Abstract classes cannot be instantiated and may include one or more abstract methods. If a class contains an abstract method, then it (the class) must be declared abstract.

In Java, abstract classes are defined using the following format:

<em>[access_modifier]</em> abstract class <em>[name_of_class]</em>

[access_modifier] specifies the access modifier of the class which could be public, private, e.t.c

abstract is the keyword that specifies that the class is an abstract class.

class is a keyword used for defining classes

name_of_class specifies the name of the class.

The only option that fulfils this format is <em>option b</em> where;

(i) The access modifier is public

(ii) The name of the class is Rectangle

Option a is not correct because the <em>abstract</em> keyword is supposed to come before the <em>class</em> keyword.

Option c is not correct because the keyword <em>abstract</em> is missing. In other words, the class must be declared abstract since it contains abstract method findArea();

Option d is not correct because the <em>abstract</em> keyword is supposed to come before the <em>class</em> keyword.

7 0
3 years ago
What does the R in the acronym SMART stand for??
jeyben [28]
Depending on who you ask, it is either Realistic or Relevant. Organizations that can't choose sometimes use the acronym SMARRT.
7 0
4 years ago
National Computer Corporation (NCC) employs Cynthia as an agent. NCC gives her an exclusive territory in which to sell NCC produ
LuckyWell [14K]

Answer:

The answer is cooperation

Explanation:

National Computer Corporation (NCC) employs Cynthia as an agent. NCC gives her an exclusive territory in which to sell NCC products. NCC cannot compete with her in that territory under the duty of cooperation

8 0
4 years ago
What can be used to store data, plant viruses, or steal data?
SCORPION-xisa [38]

Answer:

<u>ITS A SIMPLE ANSWER BUT THE PROBLEM IS TOO BIG!</u>

Explanation:

The phishing email might contain a link which on clicking will take you to a fake web page. For example, the link might take you to a fake bank website which looks very legitimate but in reality is just a lookalike. If the victim falls for the scam and enters his/her account details on the website, the details will actually go to the hacker's server instead of going to the bank and the hacker will have all the information that the victim has provided on the website.

4 0
3 years ago
Other questions:
  • Why do most people share, especially photos online using social media?
    11·2 answers
  • You administer a Microsoft SQL Server database that supports a banking transaction management application. You need to retrieve
    5·1 answer
  • A folder can contain only files? A. True B.False
    10·2 answers
  • Which statement about bump mapping and normal mapping is true?
    9·1 answer
  • ____ is an easy way to invitation through a web page​
    13·1 answer
  • Write any two web browers​
    10·1 answer
  • How does the internet works
    14·1 answer
  • Why does rating an incorrect answer as 1 star raise its score on brainly?
    8·2 answers
  • Explain why you would use the soft on/off jumper when working on ATX system
    14·1 answer
  • You notice that you have having problems with attenuation in your home network. What are two possible solutions?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!