1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ludmilka [50]
3 years ago
14

Using the methods

Computers and Technology
1 answer:
FinnZ [79.3K]3 years ago
7 0

Answer:

I AM SO SORRY FOR ROBBING U FOR 20 PTS BUT HERE IS THE ANSWER

Explanation:

My opion on math is u cannot trust anything or anyone and math is bornig

You might be interested in
What is one reason the number of DUIs has dropped?
nikdorinn [45]

Answer:

Ride Sharing Services

Explanation:

Choosing to take Uber or have a designated driver instead of driving under the influence than have fewer students because fewer people are getting caught diving under the influence.

8 0
3 years ago
Suppose your name was George Gershwin. Write a complete program that would print your last name, followed by a comma, followed b
NNADVOKAT [17]

Answer:

I will write the code in C++ and JAVA      

Explanation:

<h2>JAVA CODE</h2>

public class Main

{ public static void main(String[] args) {

       // displays Gershwin,George

     System.out.println("Gershwin,George"); }  }

<h2>C++ Code:</h2>

#include <iostream>

using namespace std;  

int main()

{  cout<<"Gershwin,George"; }    

// displays last name Gershwin followed by , followed by first name George

//displays Gershwin,George as output.

6 0
4 years ago
Read 2 more answers
Specify either "Write Through" or "Write Back" as the policy which best corresponds to each of the conditions below.
Mariulka [41]

Answer:

1. Write through

2. Write back

3. Write back

4. Write through.

Explanation:

The answers are given accordingly as above.

4 0
4 years ago
Which of the following combines something you know, such as a password, with something you are (a biometric device such as a fin
yulyashka [42]

Answer:

c. Two-factor authentication

Explanation:

Two-factor authentication is also known as 2FA. It is an extra form of security put in place aside the use of username and password to ensure the authenticity of someone trying to access an online platform with a registered account.

First the user enters his or her username and password, then they will also have to provide some extra information before finally gaining access. Such information could be ones place of birth, name of pet, something one has or know, etc.

2FA helps to still keep an account safe even if a device or password is been stolen. Two-factor authentication could be SMSbased, hardware token, software token, etc.

4 0
4 years ago
Suporting details gives you?
Korvikt [17]

The answer is option B "more information about the subject." Supporting details are used to support your argument in your essay, so you have more faces, and information in order to make a strong argument. Supporting details do indeed make your paragraph bigger but that's not the reason why they are used. Supporting details help you prove your claim and defend your argument against people who think the opposite way of your claim.

Hope this helps!

6 0
3 years ago
Other questions:
  • Using commands you learned in lessons 1 and 2. Get your IP address, netmask, DNS hostname, and MAC address. Compare these with y
    5·1 answer
  • What is requirement analysis
    8·1 answer
  • Solver: Most of this class has already been written. Complete the solveRecurse() method using the backtracking. Also complete th
    10·1 answer
  • Which tool should be used to verify the compatibility of an application run on Windows 10?
    7·1 answer
  • Why would a network administrator want to filter certain ports when capturing data such as FTP traffic
    6·1 answer
  • I still haven't figured out how to award someone branliest will someone help me? If you explain to me how to do it i will do awa
    14·1 answer
  • Hi I'm new to Brainly anyone wanna be my frnd​
    15·1 answer
  • The one who will defeat me in this typing race I will mark him/her brainliest
    10·1 answer
  • 8.10 Code Practice Question 3
    6·1 answer
  • What are general purpose computer and special purpose computer?​
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!