1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sesenic [268]
3 years ago
14

How bout these chose your fave for bnha

Computers and Technology
2 answers:
VARVARA [1.3K]3 years ago
6 0
The third one is mine
Zarrin [17]3 years ago
5 0

Answer:

Wild Child

Explanation:

Alot of these quirks in a sense don't have any really big versatility usage, most are environmental where they strike, Wild Child is very versatile in this sense. wings are bad in closed spaces, axalot is really water based, discord seems really cool, but cant be controlled.

You might be interested in
I am sorting data that is stored over a network connection. Based on the properties of that connection, it is extremely expensiv
Ann [662]

Answer: Provided in the explanation section

Explanation:

The question to this problem says;

Question:

I am sorting data that is stored over a network connection. Based on the properties of that connection, it is extremely expensive to "swap" two elements. But looping over the elements and looking at their values is very inexpensive. I want to minimize swaps above all other factors. Choose the sorting algorithm we studied that will perform the best:

ANSWER

1. Merge Sort

Because merge sort uses additional memory instead of swapping the elements.

2. Merge Sort and Quick Sort both can be used with multi processor.

cheers i hope this helps !!!

4 0
3 years ago
Angela works for an identity protection company that maintains large amounts of sensitive customer information such as usernames
aksik [14]

Answer: (B) An insider

Explanation:

 According to the question, an Angela is an insider as she maintain all the sensitive and confidential information of the customer like the password, username,SSN (Social security number) and the personal information.

Angela and her co-worker has the right for using the customer sensitive information and data. An insider is the person who keeps all the sensitive information of the organization or company.

5 0
3 years ago
Sequentially prenumbered forms are an example of a(n): a. Processing control. b. Data transmission control. c. Input control. d.
Stella [2.4K]

Answer:

Sequentially pre-numbered forms are an example of a(n):

c. Input control.

Explanation:

  • Such a type of control in which keep updating data on the basis of monitoring of data is known as Processing Control. Data matching is an example of processing control.
  • Data Transmission Control is such a control in which transmission of data    is done. Parity check is an example of data transmission control.
  • Input Control is such type of control in which user can perform different tasks like adding text. Sequentially pre-numberered forms and turn around documents are an example of an input control.
  • Examples of Data entry control include batch total and validity check.

7 0
3 years ago
¿Por qué es importante aprender a programar?
White raven [17]

Answer:

Es importante aprender a programar, por que es el mismo de que alguen aregle su carro. En estos tiempos, la technolagia se ha convertido en la nueva normal. Va vinir el tiempo quando nosotros necesitamos que arreglar un linia de codigo en nuestras computadoras, y no esta necesario para pagar alguen que ellos lo agan. Como quando necesitas que poner una llanta nueva a tu carro. Tu lo puedes cambiar solo. Entonses como el ejemplo del carro, tu puedes arreglar el linia de codigo en la computadora sin pagar alguen por acerlo.

7 0
2 years ago
If you aren’t familiar with the idea of a leap year, read “Why Is There a Leap Day?” before continuing with the lab.
Zinaida [17]

The correct debugged code is attached below

<h3>What is a leap year </h3>

A leap year is a year with 366 days and this year occurs once every 4 years. The debugged code line of code of the program written, is as attached below. because the line of code in the question lacks some functions and symbols

Hence we can conclude that the correct debugged code is attached below.

Learn more about Python coding : brainly.com/question/16397886

#SPJ1

6 0
1 year ago
Other questions:
  • Describe encryption at gateways in thePresentation layer of the OSI Reference Model
    6·1 answer
  • Encryption Using Rotate Operations Write a procedure that performs simple encryption by rotating each plaintext byte a varying n
    10·1 answer
  • as the new hr manager hired by a company to clean up some of the company's problems,analyse the system requirements for the comp
    14·1 answer
  • Justin has started a lawn mowing business in his neighborhood. He is running a weed-pulling special this month. What is the most
    8·2 answers
  • What is Naptha used for?
    9·2 answers
  • Display the total number of parking tickets.
    5·1 answer
  • In a finite state machine, state transitions happen only: a. When the reset causes a clock pulse on the D outputs of the flip-fl
    11·1 answer
  • Besides your computer, where else can you find and use an operating system?
    11·1 answer
  • What is the difference between turn-based game mode and point-based game mode?
    15·1 answer
  • A screen capture is a digital image of your screen, as if you took a picture of it with a camera. For instance, you might want t
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!