1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
scZoUnD [109]
3 years ago
13

The order of slides can be changed here.

Computers and Technology
1 answer:
tino4ka555 [31]3 years ago
5 0
ANSWER:

Yes

WHY:

Not enough information is explained


MARK ME BRAINLIEST PLEASE
You might be interested in
Which game title went on to become the highest selling unbundled cartridge game?
alexandr402 [8]

Answer:

Tetris

Explanation:

On June 6, 1984, the first version of Tetris was unveiled and quickly took the world by storm. While Tetris has appeared on every major gaming platform from the Commodore 64 to the iPhone, it arguably gained its greatest notoriety as the cartridge game bundled with the original Nintendo Game Boy.

5 0
2 years ago
What are the four conditions to help determine whether a website is a good source for information?
Ratling [72]

Answer:

1. Credible Websites are Registered with Legitimate Institutions 2. Watch out for Dummy Content for Website Credibility Check 3. Watch out for Scam Advertisements to Verify Website Credibility 4. Professional Designs Mean Everything

Explanation:

3 0
2 years ago
2. Using the Book class developed in HW 4, write an application, BookLibrary, that creates a library (array) of up to 10 books a
qwelly [4]

BookLibrary, that creates a library (array) of up to 10 books. If the user selects the add option, issue an error message if the library is full.If the book with that title exists, issue an error message

Explanation:

import java.util.Scanner;

import java.util.Arrays;

public class Derro_BooksLibrary {

public static void main(String[] args) {

 Derro_Books[] Library = new Derro_Books[10];

 Scanner scan = new Scanner(System.in);

 Derro_Books book1 = new Derro_Books("", 20);

 Derro_Books book2 = new Derro_Books("hi", 10);

 Library[0] = book1;

 Library[1] = book2;

 System.out.println("Enter 1 for add, 2 for delete, 3 for change, 4 to stop application: ");

 int answer = scan.nextInt();

 int counter = 0;

 int z = 0;

 while (true) {

  if (answer == 1) {

   for (Derro_Books book : Library) {

    counter = counter + 1;

   }

   if (counter == 10) {

    System.out.println("Library full");

   }

   System.out.println("Enter Title: ");

   String title = scan.nextLine();

   for (int i = 0; i < Library.length; i++) {

    if (title == Library[i].getTitle()) {

     System.out.println("No Duplicated Books Titles Are Allowed");

     break;

    }

    else {

     z++;

    }

   }

   if (z < Library.length) {

   System.out.println("Enter number of pages: ");

   int pages = scan.nextInt();

   Library[z + 1] = new Derro_Books(title, pages);

  }

  if (answer == 2){

   if (Library.length == 0) {

    System.out.println("Library is empty");

   }

   System.out.println("Enter title of book: ");

   String title2 = scan.nextLine();

   for (int d = 0; d < Library.length; d++) {

    if (title2 == Library[d].getTitle())

     // Delete book

     System.out.println("Deleted book: " + title2);

    else

     System.out.println("Book does not exist");

   }

  }

  if (answer == 3) {

   if (Library.length == 0) {

    System.out.println("Library is empty.");

   } else {

    System.out.println("Enter book title: ");

    String title3 = scan.nextLine();

    for (int y = 0; y < Library.length; y++) {

     if (title3 != Library[y].getTitle())

      continue;

     else {

      System.out.println("Enter number of pages: ");

      int pages = scan.nextInt();

      Library[y] = new Derro_Books(title3, pages);

     }

    }

   }

  }

  String[] StringList = new String[10];

  for (int y = 0; y < Library.length; y++) {

   StringList[y] = Library[y].getTitle();

  }

  Arrays.sort(StringList);

  for (String bookt : StringList) {

   System.out.println(bookt + Library);

  }

 }

}

}

}

6 0
3 years ago
Hat is the limit of virtual machines that can be connected to a virtual network?
skad [1K]

<u>Unlimited </u> of virtual machines that can be connected to a virtual network.

<h3>What is a virtual machine employed for?</h3>

Virtual machines (VMs) allow a business to run an operating system that conducts like a thoroughly separate computer in an app window on a desktop.

<h3>What is a virtual machine in simple words?</h3>

A virtual machine (VM) is a virtual domain that functions as a virtual computer system with its CPU, memory, network interface, and storage, constructed on a physical hardware system (located off- or on-premises)

To learn more about Virtual machines , refer

brainly.com/question/26771683

#SPJ4

4 0
1 year ago
Create a logic array qualifyingIndex with true for any location where the runner is male with a running time less than 8.2. Row
larisa [96]

Rounding Numbers

Say you wanted to round the number 838.274. Depending on which place value you'll round to, the final result will vary. Rounding 838.274:

Rounding to the nearest hundred is 800

Rounding to the nearest ten is 840

Rounding to the nearest one is 838

Rounding to the nearest tenth is 838.3

Rounding to the nearest hundredth is 838.27

5 0
3 years ago
Other questions:
  • There is a simple pattern for determining if a binary number is odd. What is it and why does this pattern occur
    6·2 answers
  • Which reading strategy refers to reading only the key words and phrases?
    13·2 answers
  • True or false. Embedding only part of a font is called presetting.
    14·1 answer
  • Directory services store information in a heirarchical structure. Which statements about Organizational Units (OUs) of a directo
    13·1 answer
  • A set of connected ideas supported by examples is ?
    7·2 answers
  • The best way to help prevent a system from a worm attack is to use anti-virus software anti-malware software a firewall a router
    12·1 answer
  • 1. Fill in the blanks:
    7·1 answer
  • Jack was drinking a glass of water near his computer when his dog bumped his arm, spilling water on his keyboard. What is the fi
    6·2 answers
  • Outside of a C program, a file is identified by its ________while inside a C program, a file is identified by a(n) ________. fil
    13·1 answer
  • STM-1 contains 63 primary 2-Mbps data streams and each of them contains 30 time slots for speech.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!