1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mashutka [201]
2 years ago
15

Name the tools in plant propagation.Q18.16.17.19.20.please po asap​

Computers and Technology
1 answer:
Agata [3.3K]2 years ago
6 0
16. Branch or tree cutter
17.paint tape
18. Knife
19. Pots
20. Waterer
You might be interested in
Sara is a college student studying accounting. She uses a laptop daily for personal and course work. What data might Sara have o
polet [3.4K]

Answer:

Sara: Personal data

Jorge : Personal data + official data.

Wanda: Personal data + students data

Carl: Personal data + official data

Explanation:

Personal data could contain pictures, social security numbers, banking transactions details, passwords, credit card information etc.

Jorge's official data could contain information about various sources that he gets his news from. It could contain password information about his official email. And he connects to the office network, he might pose a threat to the entire network if his PC is infected.

Wanda could leak the student's information. She could also leak her social security numbers, bank details, organization's details etc.

Carl could leak company's information. He can avoid it by staying away from public networks. Installing anti-virus. He should also take great care while accessing various sites and never download harmful files over the internet.

8 0
3 years ago
Time-management techniques work most effectively when performed in which order?
Sholpan [36]

Answer:

study-time survey, project schedule, prioritize tasks, reward system.

Explanation:

Time management can be defined as a strategic process which typically involves organizing, planning and controlling the time spent on an activity, so as to effectively and efficiently enhance productivity. Thus, when time is properly managed, it avails us the opportunity to work smartly rather than tediously (hardly) and as such making it possible to achieve quite a lot within a short timeframe. Also, a good time management helps us to deal with work-related pressures and tight schedules through the process of properly allocating the right time to the right activity.

Hence, time-management techniques work most effectively when performed in the following sequential order; study-time survey, project schedule, prioritize tasks, and designing (creating) a reward system.

4 0
3 years ago
. The _____________ is the responsibility of the CISO, and is designed to reduce incidence of accidental security breaches by or
irinina [24]

Answer: SETA program

Explanation:

 The SETA program is basically stand for the security, education, training and awareness. It is basically used to reduce the accidental security which is break by the organization member such as employees, vendors and contractors.

The SETA program provided various benefits to the organization as it improve the behavior of the employees.It basically enhance the training and education program by focus and concentrate on the information security.

It can also inform he member of the organization about the report of violating many policies.

7 0
2 years ago
Specific Instructions
Goryan [66]

In the most common use of the term, a class can be seen as a blueprint used to create objects. In other words, object(s) are created from a class in Java.

<h3>Creating a Class</h3><h3>Code:</h3>

import java.util.*;

class Card{

 private String suit;

 private int value;

 public Card(String s,int v){

   suit = s;

   value = v;

 }

 public String getSuit(){

   return suit;

 }

 public int getValue(){

   return value;

 }

 public void display(){

   System.out.println(value+"("+suit+")");

 }

}

class Deck{

 private ArrayList<Card> deck;

 private ArrayList<Card> drawn;

 public Deck(){

   deck = new ArrayList<Card>();

   drawn = new ArrayList<Card>();

   String[] arr = {"Club","Spade","Heart","Diamond"};

   for(String s : arr){

     for(int i=1;i<=13;i++){

       deck.add(new Card(s,i));

     }

   }

 }

 public void draw(){

   drawn.add(deck.get(0));

   deck.remove(0);

 }

 public void draw(int N){

   if(N > deck.size()){

     N = deck.size();

   }

   for(int i=0;i<N;i++){

     draw();

   }

 }

 public void showDrawn(){

   for(Card c : drawn){

     c.display();

   }

 }

 public void shuffle(){

   Collections.shuffle(deck);

 }

 public void restore(){

   restore(drawn.size());

 }

 public void restore(int N){

   if(N > drawn.size()){

     N = drawn.size();

   }

   for(int i=0;i<N;i++){

     deck.add(drawn.get(0));

     drawn.remove(0);

   }

 }

 public void showDeck(){

   for(Card c : deck){

     c.display();

   }

 }

}

class Test{

 public static void main(String[] args){

   Deck d = new Deck();

   System.out.println("Original deck\n");

   d.showDeck();

   d.draw(8);

   System.out.println("\nDeck after drawing 8 cards\n");

   d.showDeck();

   d.shuffle();

   System.out.println("\nDeck after shuffling\n");

   d.showDeck();

   d.restore();

   System.out.println("\nDeck after restoring cards\n");

   d.showDeck();

 }

}

<h3>Test Output:</h3>

C:\Users\hp\Desktop>java Test

Original deck

1(Club)

2(Club)

3(Club)

4(Club)

5(Club)

6(Club)

7(Club)

8(Club)

9(Club)

10(Club)

11(Club)

12(Club)

13(Club)

1(Spade)

2(Spade)

3(Spade)

4(Spade)

5(Spade)

6(Spade)

7(Spade)

8(Spade)

9(Spade)

10(Spade)

11(Spade)

12(Spade)

13(Spade)

1(Heart)

2(Heart)

3(Heart)

4(Heart)

5(Heart)

6(Heart)

7(Heart)

8(Heart)

9(Heart)

10(Heart)

11(Heart)

12(Heart)

13(Heart)

1(Diamond)

2(Diamond)

3(Diamond)

4(Diamond)

5(Diamond)

6(Diamond)

7(Diamond)

8(Diamond)

9(Diamond)

10(Diamond)

11(Diamond)

12(Diamond)

13(Diamond)

<h3>Draw action:</h3>

9(Club)

10(Club)

11(Club)

12(Club)

13(Club)

1(Spade)

2(Spade)

3(Spade)

4(Spade)

5(Spade)

6(Spade)

7(Spade)

8(Spade)

9(Spade)

10(Spade)

11(Spade)

12(Spade)

13(Spade)

1(Heart)

2(Heart)

3(Heart)

4(Heart)

5(Heart)

6(Heart)

7(Heart)

8(Heart)

9(Heart)

10(Heart)

11(Heart)

12(Heart)

13(Heart)

1(Diamond)

2(Diamond)

3(Diamond)

4(Diamond)

5(Diamond)

6(Diamond)

7(Diamond)

8(Diamond)

9(Diamond)

10(Diamond)

11(Diamond)

12(Diamond)

13(Diamond)

<h3 /><h3>Shuffling action:</h3>

12(Diamond)

8(Spade)

4(Spade)

6(Diamond)

10(Spade)

13(Club)

7(Heart)

13(Heart)

7(Diamond)

9(Heart)

11(Diamond)

5(Heart)

8(Diamond)

9(Diamond)

3(Spade)

13(Spade)

4(Heart)

2(Heart)

3(Heart)

5(Diamond)

11(Heart)

11(Club)

10(Club)

9(Club)

3(Diamond)

4(Diamond)

6(Spade)

9(Spade)

10(Heart)

11(Spade)

5(Spade)

12(Spade)

1(Spade)

6(Heart)

12(Heart)

13(Diamond)

1(Heart)

2(Diamond)

1(Diamond)

7(Spade)

12(Club)

10(Diamond)

2(Spade)

8(Heart)

  • Restore action

12(Diamond)

8(Spade)

4(Spade)

6(Diamond)

10(Spade)

13(Club)

7(Heart)

13(Heart)

7(Diamond)

9(Heart)

11(Diamond)

5(Heart)

8(Diamond)

9(Diamond)

3(Spade)

13(Spade)

4(Heart)

2(Heart)

3(Heart)

5(Diamond)

11(Heart)

11(Club)

10(Club)

9(Club)

3(Diamond)

4(Diamond)

6(Spade)

9(Spade)

10(Heart)

11(Spade)

5(Spade)

12(Spade)

1(Spade)

6(Heart)

12(Heart)

13(Diamond)

1(Heart)

2(Diamond)

1(Diamond)

7(Spade)

12(Club)

10(Diamond)

2(Spade)

8(Heart)

1(Club)

2(Club)

3(Club)

4(Club)

5(Club)

6(Club)

7(Club)

8(Club)

You can learn more about creating a class here brainly.com/question/10410845

6 0
2 years ago
Can you edit header or footer? if yes, how​
DiKsa [7]

Answer:

It depends on the type of document you are trying to edit, but normally you can edit the header/footer.

Explanation:

For docs, you just double click near the top/bottom of the page.

8 0
2 years ago
Other questions:
  • A ____ is a prewritten formula that is built into excel.
    6·1 answer
  • The term _____ best describes the level of technology skills needed in today’s business world.A: computer knowledgeB: computer f
    10·1 answer
  • What is the recommended solution to configure this automated behavior? UC has a requirement that an opportunity should have a fi
    8·1 answer
  • Count positive and negative number and compute the average. The program will have the user input an unspecified number of intege
    6·1 answer
  • A switch that is configured to use the Spanning Tree Protocol will place a port in ____________ mode if sending traffic to it ma
    11·1 answer
  • Deleting anitem from a linked list is best when performed using two pointersso that the deleted item is freed from memory.
    7·1 answer
  • Write a program that has a conversation with the user. The program must ask for both strings and numbers as input. The program m
    12·1 answer
  • You work in an office that uses Linux servers and Windows servers. The network uses both the TCP/IP protocol. The Linux server i
    11·1 answer
  • Wilt short answer of the fol<br>What is an operating systeme te ay maglia<br>​
    12·1 answer
  • When you're writing for mobile devices, use ________ to present the most important information first and provide successive laye
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!