1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zzz [600]
3 years ago
12

The code selection above is taken from the Color Sleuth activity you just completed. This selection would count as an abstractio

n on the Create PT, but to earn Row 8 you will need to describe how this abstraction manages complexity. Write response 2d describing the abstraction above. Use the writing prompt and scoring guidelines as a guide.
Computers and Technology
1 answer:
Vinvika [58]3 years ago
4 0

Answer:

b

Explanation:

You might be interested in
Assuming that s and t are Strings, which of the following code fragments are such that the value returned by s.indexOf( t ) befo
KengaRu [80]

Answer:

What programming language is this

Explanation:

5 0
2 years ago
Suggest why people might not want the government to carry out Internet surveillance?​
Vadim26 [7]
Suggest why people might not want the government to carry out Internet surveillance?
To see your history all that p o r n ya watch
Pls mark me brainliest;p
3 0
3 years ago
Read 2 more answers
3. Answer the following in one sentence: (1*6=6 )
Whitepunk [10]

Answer:

A

Explanation:

I did it

7 0
3 years ago
Read 2 more answers
A short circuit locator should be periodically run along the cords used in a shop to check for shorts and open circuits. A.)True
masya89 [10]

The answer is,  A) True

5 0
3 years ago
Read 2 more answers
Help please<br> helpp im begging
NemiM [27]
I think That it is A
6 0
3 years ago
Other questions:
  • The _______ displays the name of the open file and the program.
    13·1 answer
  • An administrator needs to set up an authentication server for users connecting to a network through a VPN. What kind of server c
    10·1 answer
  • Which of the following is a sigh that your computer may have been infected with malicious code
    12·1 answer
  • Trisha is looking for a new table style. What is the fastest way for her to preview how different styles in the gallery would lo
    13·1 answer
  • Can somebody explain me what this code does in a few or one sentence?#include #include using namespace std;int main () { const i
    12·1 answer
  • Select the steps for adding artwork into a placeholder on a presentation slide
    11·1 answer
  • What happens when the following code segment executes if test.txt does not exist?:<br> A,B,C,D?
    7·1 answer
  • The CMOS battery located on a computer's motherboard allows for maintaining the correct time and date information stored in CMOS
    7·1 answer
  • QUESTION 1
    6·1 answer
  • What is the descriptor for a filter that warns or blocks you from potentially fraudulent or suspicious websites?.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!