1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saveliy_v [14]
3 years ago
13

Hi i choose brainlyest 4 free

Computers and Technology
2 answers:
irinina [24]3 years ago
7 0

Answer:

bet

Explanation:

kiruha [24]3 years ago
4 0
Okay :........... thats cool
You might be interested in
Helen has no experience in security. She would like to earn a certification that demonstrates that she has the basic knowledge n
rewona [7]

Answer:

Option C. Security+ is the correct answer.

Explanation:

8 0
3 years ago
Encryption is the key to keeping your personal information secure online.<br><br> True<br><br> False
Katen [24]
True I checked online
3 0
3 years ago
Public class Billing {
Trava [24]

Answer:

C

Explanation:

7 0
3 years ago
Words like "free" or "percent off" will not only trigger spam filters for your email, but will also ___________
weeeeeb [17]

Answer:

eliminasnados

Explanation:

6 0
3 years ago
Write the definition of a function square, which receives an integer parameter and returns the square of the value of the parame
MatroZZZ [7]

Answer:

public static int square(int num){

       return num*num;

   }

Explanation:

Using the Java Programming Language, we declare a function named square as stated in the question, the return type of the function is stated as integer. And the the parameter it receives is an integer number called num.

To get the square of the number we use the expression num*num, and return the the squared value. When the function is called, it will receive one argument (an integer value), it will calculate the square and return it.

5 0
3 years ago
Other questions:
  • The efficiency of a screw is low because of _____. width friction length height
    10·2 answers
  • 11) Write the definition for a child class of Circle named Cylinder. The cylinder should have a double attribute named height. T
    12·1 answer
  • o maintain reasonable key security (mark all that apply): Ensure that someone else always has an extra key. Ensure that no extra
    10·1 answer
  • Describe a time when you influenced someone else’s knowledge around technology, whether it be an app, a new gadget, etc. What di
    14·1 answer
  • Phase 1 RequirementsCode submitted for Phase 1 will only have the following capability. Any additional coding will result in the
    13·1 answer
  • What is the most important trait of the first pilot project in the AI Transformation Playbook?
    10·1 answer
  • List the seven basic internal components found in a computer tower
    6·2 answers
  • Write down the different types of testing with their definition.
    11·1 answer
  • Weaknesses about ICT Technician
    9·1 answer
  • Spreadsheets are sometimes credited with legitimizing the personal computer as a business tool. Why do you think they had such a
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!