1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fiesta28 [93]
3 years ago
11

Commet what u think of this mha fans only

Computers and Technology
1 answer:
g100num [7]3 years ago
4 0

Answer: ITS SO CUTE

Explanation:

YESS SO CUTEEE

You might be interested in
Write the definition of a class Telephone. The class has no constructors, one instance variable of type String called number, an
balu736 [363]

Answer:

The definition of a class Telephone is given as  

public class Telephone // class telephone

{

String number; // variable  number of type string

static int quantity = 250; // variable  quantity  of type int

static double total = 1565.92;  // variable  total  of type double

}

Explanation:

Following is the description of Statement

  • Create a class "Telephone" by using the keyword class.In that class we declared data member .
  • We declared a variable "number" of type "string" which has no constructor.
  • We declared a variable  "quantity" of type "int" which is a static type variable. The static type variable retains the value during the program execution.
  • We declared a variable  "total" of type "double" which is a static type variable. The static type variable retain the value during the program execution .
5 0
4 years ago
>>> import math >>> print(math.Pi) 3.141592653589793 >>> def print_volume(): print ("What is the radi
kvasek [131]
I have no clue what this is asking...
8 0
3 years ago
While conducting a vulnerability assessment, you're given a set of documents representing the network's intended security config
Sophie [7]

Answer:

The baseline review

Explanation:

Solution:

The baseline review: this can be defined as the gap analysis or the beginning environmental review (IER). it is an assess study to get information about an organisation's present activities and associated environmental impacts,  impacts and legal requirements.

This review issues an overview of the quality and weaknesses of an organisation’s environmental execution and opportunities for improvement.

6 0
3 years ago
In distributed dos attacks, the attacker sends messages directly to ________. bots the intended victim of the dos attack backdoo
kirill115 [55]
The word DoS refers to the Disk Operating System. In the case given above, if it happens that there is a distributed DoS attack, the attacker then sends messages directly to the BOTS. Bots refer to internet or web robots. Hope this answer helps. The answer is the first option.
4 0
4 years ago
Using C++Chapter 6 - Programming Challenge 24 - Rock Paper Scissors GameMake sure you use at least one function to make your cod
olganol [36]
You might send me the picture of it because I think it’s $45
8 0
3 years ago
Other questions:
  • A document may wordwrap differently depending on the type of printer being used.
    8·1 answer
  • Which is the most likely reason film companies expanded so quickly?
    8·1 answer
  • The challenge of preparing for ____________________ is in ensuring that employees do not feel that they are being prepared for t
    7·1 answer
  • Programs which were typically reserved for college-level classes such as computer animation and CAD programs are now being appli
    13·1 answer
  • Explain Text align , Text Decoration, colour, Text shadow..​
    11·1 answer
  • Difference between a lesson plan and scheme of work​
    6·2 answers
  • Select the correct answer from each drop-down menu.
    13·1 answer
  • HELP ME PLEASE
    8·1 answer
  • Instructions
    8·1 answer
  • State two skills to be used to access information from the internet in order to avoid unwanted materials.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!