1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Butoxors [25]
3 years ago
9

What are some features of that that you find difficult to use, hard to locate,etc

Computers and Technology
1 answer:
zysi [14]3 years ago
4 0
What is it? Send a picture maybe.
You might be interested in
How can I make [ print(3 * x) ] into a functional python code?
CaHeK987 [17]

If you're programming in python, you simply have to assign a value to x and then use the print function. For instance,

x = 3

print(3 * x)

9 will be the output. I hope this helps!

5 0
3 years ago
In file hashing, a file is read by a special algorithm that uses the value of the bits in the file to compute a single number ca
Zielflug [23.3K]

Answer:

Option (B) i.e., Hash is the correct option.

Explanation:

A hash value is the number that has the fixed length and the data recognition is uniquely. It is also a type of file that is read by the special type algo, it uses the value of the bits in the following computer files which is used to manipulates the single number. That's why the following option is correct.

7 0
4 years ago
Which of these skills are used in game design?
olasank [31]

Answer:

I think the answer is Writing but am not sure

8 0
3 years ago
How do you know if someone read your message on messenger?
kherson [118]
It would say that the person read the message on the picture of the person. Example if you texted your friend at 7.00 and it said that the person read at 7.15. got it now?
3 0
3 years ago
Design a TestScores class that has fields to hold three test scores. The class should have a constructor, accessor and mutator m
sweet-ann [11.9K]

Answer:

Answered below

Explanation:

class TestScores {

double test1;

double test2;

double test 3;

public TestScores (double test1, double test2, double teat3){

this.test1= test1;

this.test2 = test2;

this.test3 = teat3;}

//mutator

public setTest1(double test1){

this.test1 = test1;

}

//accessor

public double getTest1(){

return test 1;

}

//Write same accessors and mutators for test2 and test3

public double getTestAverage(){

double sum = test1+test2+test3;

return sum / 3;

}

}

class TestRun{

public static void main (String [] args){

TestScores scores = new TestScores(50.5, 40.0, 80.7)

int average = scores.getTestAverage();

System.out.print(average);

}

6 0
3 years ago
Other questions:
  • Cryptolocker is an example of what type of malware?
    11·1 answer
  • Charli's password was changed a couple of weeks ago because someone figured it out. Can someone go to a password generator and f
    5·2 answers
  • What is a major way that a consumer can protect himself/herself when getting a credit card? A) Making sure that they get a very
    8·1 answer
  • Another pitfall cited in Section 1.10 is expecting to improve the overall performance of a computer by improving only one aspect
    13·1 answer
  • Businesses and sometimes individuals use a _____ to assimilate all of their social media content on a specific topic to engage r
    13·1 answer
  • A company that manufactures machine parts orders a new system that makes products at ten times the speed of the earlier machine.
    15·1 answer
  • State any three points of importance of local level profession​
    11·1 answer
  • Explain any two features of a computer​
    15·1 answer
  • The director of security at an organization has begun reviewing vulnerability scanner results and notices a wide range of vulner
    11·1 answer
  • It would be at least two decades before some of
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!