1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anygoal [31]
3 years ago
6

Please answer no files !!

Computers and Technology
1 answer:
Pachacha [2.7K]3 years ago
8 0

Answer:

im not exactly sure but i think its c

Explanation:

You might be interested in
Debug the program so it prints the factorial of a positive integer entered by the user. This is calculated by multiplying all th
Monica [59]

Your main problem was declaring int prod in the while loop. This caused prod to be reset back to 1 every time the while loop ran.

3 0
3 years ago
Which device should be used for enabling a host to communicate with another host on a different network?
Lady bird [3.3K]
A router <span>should be used for enabling a host to communicate with another host on a different network.</span>
7 0
3 years ago
When reading words using a Scanner object's next method, _________. a. any characters at the beginning of the input that are con
zavuch27 [327]

Answer:

The answer is "Option d"

Explanation:

The scanner method is the full token of the process, that finds and returns. It is token, which is followed by both the inputs meeting and the guideline template. This method can block, even though the former instance of hasNext() is true while waiting for input, and wrong choices can be described as follows:

  • In option a, It is incorrect because the character at the beginning can't be considered.
  • In option b, It is wrong because the characters are known as the word in which blank space not a part of the word.
  • In option c, It is wrong because in this input before the call is not the method.
3 0
3 years ago
Draw an example of a binary tree that:
Liula [17]

Answer:

I hope it will help you!

Explanation:

6 0
3 years ago
What is one example of how teens use the internet and social media for cyberbullying
vovikov84 [41]

Cyberbullying occurs when individuals use technology to write aggressive, embarrassing, or hateful messages to/about peers in order to intimidate, harass, shame, and control.

7 0
3 years ago
Read 2 more answers
Other questions:
  • You can change the color of the value of a cell or the background
    14·2 answers
  • Which feature enables you to make changes to all the slides of your presentation at the same time?
    15·2 answers
  • Create a program that will play the “cows and bulls” game with the user. The game works like this: Randomly generate a 4-digit n
    15·1 answer
  • How does a hard drive work?
    5·1 answer
  • Passwords are usually alphanumeric and usually cannot contain spaces or ________.
    10·2 answers
  • You are an online training company and stream a lot of training videos from your
    12·1 answer
  • A computer byte is the amount of data (measured in bits) that CPU can manipulate at one time/
    8·1 answer
  • A_______ to show the working of an object before it is built or made. A. Prototype b. Test c. Evaluation d. Plan
    10·1 answer
  • How to do the for loop in python
    12·1 answer
  • What is the easiest way to migrate data from quickbooks desktop to quickbooks online?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!