1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Igoryamba
3 years ago
10

It's a holiday poop in my bitt

Computers and Technology
2 answers:
dmitriy555 [2]3 years ago
5 0

Answer:

ok..........

Explanation:

Zina [86]3 years ago
4 0

Answer:

bitt

Explanation:

pp

You might be interested in
In addition to assessing whether each of your independent variables has an effect on the dependent variable, a factorial ANOVA a
Olegator [25]

Answer:

C) determine whether the effects of one factor depend on the other factor.

Explanation:

ANOVA is analysis of variance which helps to understand whether the population mean are equal or not. It is statistical model which is used by the businessmen to analyze their business performance. ANOVA also determines whether the effect of one factor are related or dependent on other factor.

8 0
3 years ago
Which of the following characteristics of an e-mail header should cause suspicion?A. Multiple recipientsB. No subject lineC. Unk
julsineya [31]

Answer:

The correct answer for the given question is option(b) i.e " No subject line"

Explanation:

In the e-mail subject is the important part which describe the information which kind of particular mail is send or received .if we do not give any subject line in the e-mail header then most of the chances that email will not read by recipients due to this suspicion will be caused.

Unknown Sender and Multiple recipients do not cause suspicion so the correct answer is option(b) i.e No subject line".

3 0
3 years ago
What is a logical grouping of related records called?.
irakobra [83]

Answer:

File

Explanation:

Files are frequently classified by the application for which they are primarily used (employee file). A primarily key in a file is the field whose value identifies a record among others in a data file

6 0
3 years ago
For this lab, you will work on a simple GUI application. The starting point for your work consists of four files (TextCollage, D
Bad White [126]

The answer & explanation for this question is given in the attachment below.

Download docx
4 0
3 years ago
Write a C++ program that computes an approximation of pi (the mathematical constant used in many trigonometric and calculus appl
Verizon [17]

Answer:

#include <iostream>

#include<cmath>

using namespace std;

int main()

{

double total = 0;

double check=1;

double ct=0;

double old=1;

while( fabs(total - old) > 0.00005 )

{

old=total;

total=total+check*4.0/(2.0*ct+1);

ct=ct+1;

check=0.0-check;

}

cout<<"Approximate value of pi is "<<total<<endl;

return 0;

}

Explanation:

  • Initialize all the necessary variables.
  • Run a while loop until the following condition is met.

fabs(total - old) > 0.00005

  • Inside the while loop calculate the total value.
  • Lastly, display the approximate value of pi.
3 0
4 years ago
Other questions:
  • What type of multimedia is a game CD? Game CDs are examples of ___ multimedia.
    15·2 answers
  • What are the three modes of the 3D transform manipulator
    12·1 answer
  • Structured walk-throughs take place throughout the SDLC and are called _____ reviews, depending on the phase in which they occur
    9·1 answer
  • Why is ice even more dangerous than snow
    9·2 answers
  • Write pseudocode instructions to carry out each of the following computational operations:1. Determine the area of a triangle gi
    12·1 answer
  • The Michael Porter Diamond of National Advantage is a framework that explains why countries foster successful multinational corp
    11·1 answer
  • The File method lastModified() returns
    10·1 answer
  • Types of libraries in operating system​
    8·1 answer
  • Which design monument beginning with A inspired the chrysler building in New York​
    14·1 answer
  • quizlet ann is a security professional for a midsize business and typically handles log analysis and security monitoring tasks f
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!