1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nadya [2.5K]
3 years ago
11

Brainly is brainly am I correct ​

Computers and Technology
2 answers:
Bezzdna [24]3 years ago
7 0

Answer:

yes

Explanation:

its a app

hope it is correct

mark me as brainiest

Katena32 [7]3 years ago
7 0

Answer:

yes, you're correct.

Explanation:

yes.

You might be interested in
The destructor automatically executes when the class object goes out of ____.
Tema [17]

Answer:

scope    

Explanation:

Destructor is a member function and it call automatically when the class object goes out of scope.

Out of scope means, the program exit, function end etc.

Destructor name must be same as class name and it has no return type.

syntax:

~class_name() { };

For example:

class xyz{

  xyz(){

        print(constructor);

   }

~xyz(){

        print(destructor);

   }

}

int main(){

    xyz num;

   

}//end program

when the object is create the constructor will called and when the program end destructor will call automatically.

4 0
3 years ago
The purpose of the ___________ is to provide sufficient notice to individuals whose personal information has been stolen so they
Ahat [919]

Answer:

California Identity Theft Statute

Explanation:

The California Identity Theft Statute, also referred to as the Penal Code 530.5 PC is a statute that clearly provides a definition of what the crime of identity theft actually is. Identity theft is a crime committed when the personal identifying information of another person is taken and used unlawfully or fraudulently. The statute further provide ample information to victims of identity theft in order to avert such occurrence or further damage.

4 0
4 years ago
Why do we need multitasking functionality in an Operating System?
Leokris [45]

Answer:

Multitasking is a process in which we do multiple task at a time.    

In computing system, multitasking is the concept of performing different types of multiple task and process over a certain period of time by executing simultaneously.

Operating system basically allow various task to run simultaneously by the user. In an operating system, each task consume storage system and all the other resources.

Multitasking function facilitate memory isolation in the processor and also supported different levels of security system in the operating system. For example, "a programmer working on any program in a system and as well as listening the music then, it perform multiple task at the same time".

7 0
3 years ago
If you have an if/else if/else code sequence with 4 blocks, what is the minimal number of input values that you should use to te
yawa3891 [41]

Answer:

4 is the correct answer for the above question.

Explanation:

  • If the if-else sequence has 4 blocks then it will be designed like if, else-if, else-if and then else which made 4 blocks which are as follows:-
  1. The first block is an if block.
  2. Then the second block is an else-if block.
  3. The third block is also else-if block and
  4. The fourth block else blocks.
  • So there is a need of 4 value (one value for each case) to test the application which is defined in the above scenario.
  • It is because when the first if statement is false then the first else-if statement is executed and when the first else statement is false then the second else-if statement is executed and when it is false then the else statement will executed.
7 0
3 years ago
Fghfghgfhgfhgfhfghgfhgfhfghgfhgfh
Nataly [62]

Answer:

Stay safe, stay healthy and blessed.

Have a good day !

Thank you

3 0
3 years ago
Read 2 more answers
Other questions:
  • 5. Why would you want to wear white or light colors on a summer day?
    5·1 answer
  • What does CPL stand for
    9·2 answers
  • A security policy is a
    11·1 answer
  • If you implement a Wireless LAN (WLAN) to support connectivity for laptops in the Workstation Domain, which domain does WLAN fal
    5·1 answer
  • There are a few simple rules that you can follow to store and manage files and folders in your computer. What is the most import
    9·2 answers
  • The IT department sent out a memo stating that it will start delivering desktop computer interfaces through the IT data center v
    5·1 answer
  • Can someone help please
    12·1 answer
  • What techniques overcome resistance and improve the credibility of a product? Check all that apply.
    8·1 answer
  • What spreadsheet tool could be used to add together the numbers in a<br> selected group of cells?
    10·1 answer
  • when you sent email your email can be set to automatically keep a copy where do you find these copies​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!