1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mariarad [96]
3 years ago
15

I need help..

Computers and Technology
1 answer:
labwork [276]3 years ago
5 0

Answer:

which app are u using u should use Android studio or if u are using mac book use xcode

You might be interested in
In cybersecurity, a threat actor is an individual or an entity responsible for cyber incidents against the technical equipment o
Neporo4naja [7]

Script kiddie use automated attack software created by other hackers for access while gray hat hackers create their own attack software to show vulnerabilities.

<h3>The types of threat actors.</h3>

In cybersecurity, there are different types of threat actors and these include the following:

  • Script kiddie
  • Gray hat hacker
  • Hacktivists

One of the ways to differentiate an attack orchestrated by a script kiddie from that of a gray hat hacker is that script kiddie use automated attack software created by other hackers for access while gray hat hackers create their own attack software to show vulnerabilities.

Read more on cybersecurity here: brainly.com/question/14286078

#SPJ1

4 0
2 years ago
Select
valentinak56 [21]

Answer:

return values.remove() + values.remove();

Explanation:

The appropriate expression to complete the method, which is designed to return the sum of the two smallest values in the parameter array number is indicated below in bold font :

public static int

sumTwoLowestElements(int[] numbers)

{

PriorityQueue values = new PriorityQueue<>();

for (int num: numbers)

{ values.add(num);

}

return values.remove() + values.remove();  

}

The return statementin programming is often used when a function is ready to return a value to its caller.

6 0
3 years ago
During the software planning process, Rick, a project manager, finds that his team has made an incorrect estimation of funds. Wh
allochka39001 [22]

Answer:

Rick has identified a cost risk.

Explanation:

Risk is the probability of loss in a given setting. Herein, the risk involved is the inadequate assessment of the costs involved to carry out the project usually as a result of poor pricing evaluation of resources required for the project. At the early stage of every project, effective and efficient cost estimation is needed because it provides a basis for estimation of the total costs, it helps distribute the cost budget, it eases decision making and thereby assuring a level of profitability, everything being equal.

7 0
3 years ago
Read 2 more answers
To change the design of a query, right-click the query in the Navigation Pane and then click ____ on the shortcut menu.
Rama09 [41]
TO change the design of a query, right click the query in the Navigation Panel and the click "Design View" on the shortcut Menu. Design view tab is where you can make changes on your current design for your presentation,
7 0
3 years ago
True or false you have no control over who views your social network information
il63 [147K]
  Your answer would be false. That's what you have security settings for.
4 0
4 years ago
Read 2 more answers
Other questions:
  • A(n) ____________________ can improve system performance when two devices have different data transfer rates, as when copying mu
    12·1 answer
  • Your Economics teacher has asked you to create a chart showing how supply and demand affects the price of gasoline. Which applic
    11·1 answer
  • Why is updating your anti-virus a good thing?
    13·1 answer
  • What type of link is used to call this file?
    8·1 answer
  • Anybody know any educational game sites unblocced in school besides funbrain and pb skids
    12·1 answer
  • Which output device would a teacher use to show
    13·1 answer
  • What might a designer need to consider when choosing an appropriate energy source for products and power systems
    15·1 answer
  • Who Invented Abacus!
    15·1 answer
  • Blockchain is often associated with Bitcoin and the financial services industry. However, it is applicable to almost every indus
    13·1 answer
  • Sharon's company has written a new computer program, and she has been asked to find a way to prevent people from copying the sof
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!