1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Allisa [31]
3 years ago
10

How did hitles rules in nazi germany exemplify totiltarian rule?

Computers and Technology
1 answer:
ddd [48]3 years ago
7 0

Answer:

hope this helps if not srry

You might be interested in
Meg[] elements = {new Lois(), new Stewie(), new Meg(), new Brian()}; for (int i =0; i
Stells [14]

Complete question is attached as snapshot.

Answer:

This will result in a compilation error.

Here's the inheritance hierarchy:

Meg -> Lois -> Brian -> Stewie

Now Meg has 2 public Fxns, a() and toString().

Lois inherits from Meg and all its public functions as well but, overrides the a() fxn of its super class.

So finally Lois has fxns a(), b() and toString().

Brian extends Lois and inherits all the above listed fxns of Lois, but overrides the b() and toString() fxns.

Stewie extends Brian and inherits all the fxns of Brian, but overrides the a() and toString() fxns.

In the Main driver fxn, we call a() and b() methods of all these classes but, the base class Meg has no b() and it is not extending any class so its not available in its scope.

This results in a compilation error.

Explanation:

7 0
3 years ago
A four-year old laptop will not boot and presents error messages on screen. you have verified with the laptop technical support
vodka [1.7K]
Could I buy A WAY better one this one for a lower price
6 0
3 years ago
As our use of the internet increases e-safety becomes essential.<br> Discuss why e-safety is needed.
nlexa [21]

Answer:

The answer is described below

Explanation:

E safety means means protection of private information and personal safety when using the internet. E safety involve the protection of private information, passwords against identity theft or property theft. A persons  private information, passwords can be gotten through the use of phishing or malwares.

Also, the use of internet has exposed people to cyber bullying(i.e abuse of an individual), stalking, engaging underage children into sexual relationships and sextortion.

E safety  help protect children from harmful content and services as those listed.

8 0
3 years ago
How can photography allow us to view the world around us in different ways?
Nimfa-mama [501]
Photography allows us to view the world around us in different ways, by giving us the sense and feel of what others feel, Photography is art. You are able to use photography to define actions, for example happiness in a marriage or happiness in children playing at the park. Photography also allows you to explore and discover new things, and make something out of that. It makes you think a bout different ways to change the world around you, how do you define the world?
7 0
3 years ago
Read 2 more answers
What types of data sources could be used in a mail merge? Check all that apply.
krok68 [10]

<u>The types of data sources that could be used in a mail merge are:</u>

  1. Word tables
  2. a database
  3. an excel sheet
  4. an outlook contacts list

<u>Explanation:</u>

Mail merge allows one to send a particular document to different individuals.  It is generally used in office environment where some information is to be communicated  to a number of people. The information is attached by adding the data sources.

Mail merge comprises of joining mail and letters and pre-tended to envelopes or mailing names for mass mailings from a structure letter.

In database mail merging it is embedding it into reports, for example, letters, mailing marks, and unofficial IDs.

Tables assist you with exhibiting data in an unmistakable and sorted out way. Tables are helpful for different assignments, for example, introducing content data and numerical information.

In excel the component in Microsoft Word and Excel streamlines the way toward sending a similar report with customized changes to a few beneficiaries.

In outlook contacts, the wellspring of customized data in a bunch of Word reports, through Word's mail blend include through Word's mail merge feature.

8 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following would an interactive media proffessional must likely need
    9·1 answer
  • You are designing a VPC for a small application. It will operate in a private subnet and needs internet access to software updat
    6·1 answer
  • Jordan has been asked to help his company find a way to allow all the workers to log on to computers securely but without using
    6·1 answer
  • 5. Drawing Conclusions If you were a person in
    10·1 answer
  • One of the first signals that an organization is making progress in the development of its IR program, specifically in the devel
    6·1 answer
  • (Convert milliseconds to hours, minutes, and seconds) Write a function that converts milliseconds to hours, minutes, and seconds
    12·1 answer
  • What are wizard ranks in brainly​
    13·2 answers
  • Ashton assigned a string value to a variable. Which program statement should he use?
    5·1 answer
  • An ALGORITHM IS?<br> PLEASE HELP
    14·1 answer
  • Which phrase is the best definition of sparklines in Excel 2016?
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!