1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pogonyaev
3 years ago
15

PLZZZZZZZZZZZZZZZZZ HELP I WILL GIVE 85 POINTS AND MARK BRAINLIEST

Computers and Technology
1 answer:
nirvana33 [79]3 years ago
8 0

Answer:

Hey here is a tip: for your essay put your letters in white ink at the end  so it looks like 300 words.

Explanation:

You might be interested in
This is gonna be very long but I have no idea what to do, I'm confused.
kaheart [24]

for such experiment, you do it with care and to acquire and determine to put experience in it

Explanation:

because without you been or using experience the experiment will not correct

8 0
2 years ago
Because of the abundance of water on planet Earth, hydrogen gas (H2) is a candidate in the search for a replacement for petroleu
Dennis_Churaev [7]

The reason why plants are considered to be one step ahead in the utilization of hydrogen as an alternative fuel source is because; Plant cells possess water-splitting enzymes

<h3>What are splitting Enzymes?</h3>

Splitting Enzyme’s are like aldolases that catalyze the conversion of a molecule into two smaller molecules without the addition or removal of any atoms.

Now in plant biology, plants make use of he light-driven water-splitting/oxygen-evolving enzyme known as Photosystem II in photosynthesis to split water.

Read more about splitting enzymes at; brainly.com/question/14713715

3 0
2 years ago
If you want to protect your identity while social networking, then you might use a(n) ____________ for your profile image
notsponge [240]
Won't you use a fake photo for your profile image or not put one on at all! This is a very safe way to keep your identity a secret and that you are very safe while you are online.

Hope this help!!
4 0
3 years ago
Predict what the world would be like if no one tried to think critically. explain your predictions
Kay [80]

The world would be in chaos and we would all be dead duh.

7 0
2 years ago
Write a method getIntVal that will get the correct value input as integer numbers from the user. The input will be validated bas
Setler [38]

Answer:

 import java.util.Scanner;

public class Main

{  

   //Create a Scanner object to be able to get input

   public static Scanner input = new Scanner(System.in);

   

public static void main(String[] args) {

    //Ask the user to enter the lowest and highest values

    System.out.print("Enter the lowest: ");

    int lowest = input.nextInt();

    System.out.print("Enter the highest: ");

    int highest = input.nextInt();

   

    //Call the method with parameters, lowest and highest

    getIntVal(lowest, highest);

}

//getIntVal method

public static void getIntVal(int lowest, int highest){

    //Create a while loop

    while(true){

        //Ask the user to enter the number in the range

        System.out.print("Enter a number between " + lowest + " and " + highest + ": ");

        int number = input.nextInt();

       

        //Check if the number is in the range. If it is, stop the loop

        if(number >= lowest && number <= highest)

            break;

        //If the number is in the range,

        //Check if it is smaller than the lowest. If it is, print a warning message telling the lowest value

       

        if(number < lowest)

            System.out.println("You must enter a number that is greater than or equal to " + lowest);

        //Check if it is greater than the highest. If it is, print a warning message telling the highest value

        else if(number > highest)

            System.out.println("You must enter a number that is smaller than or equal to " + highest);

    }

}

}

Explanation:

*The code is in Java.

You may see the explanation as comments in the code

4 0
3 years ago
Other questions:
  • What is authentication?
    8·1 answer
  • What is the lowest and highest address of a 2^20 byte memory, if it is byte readable.
    11·1 answer
  • Assume that the following code segment C is executed on a pipelined architecture that will cause data hazard(s): Code segment C:
    9·1 answer
  • Which of the following is NOT true about variables?
    13·1 answer
  • Use the variables k, d, and s so that they can read three different values from standard input--an integer, a double, and a stri
    15·1 answer
  • Why has base 2 been accepted and used as the basis for computing?​
    8·1 answer
  • Need help asap please​
    13·1 answer
  • Can someone follow my tt its c1ndy.dont.miss
    6·1 answer
  • James root lol ........................
    12·1 answer
  • after adding a sound to a slide, the audio tools tab will allow you to apply artistic effects and quick styles to your sound ico
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!