1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ankoles [38]
3 years ago
11

Write a Java statement that declares and creates an array of Strings named Breeds. Your array should be large enough to hold the

names of 100 dog breeds.
Computers and Technology
1 answer:
Leno4ka [110]3 years ago
5 0

Answer: String[]Breeds = new String[100]

You might be interested in
Write an expression that will print "in high school" if the value of user_grade is between 9 and 12 (inclusive).
Free_Kalibri [48]

In python:

if 8 < user_grade < 13:

   print("in high school")

You would just need to supply the value of the user_grade variable.

7 0
3 years ago
∀פפIN∀W∀ qwda dawdawdawdawd<br> BAN ME NOW
Dvinal [7]

Answer:

why

Explanation:

6 0
3 years ago
Which of the following is NOT one of the MOST common uses of Twitter?
I am Lyosha [343]
Which of the following is NOT one of the MOST common uses of Twitter? b . Making a business contact.
5 0
3 years ago
Which of the following is true of functions? * 2 points A. Programs written with functions run more quickly B. Functions can hel
Paraphin [41]

Answer:

c

Explanation:

7 0
3 years ago
Read 2 more answers
Which of the following combines something you know, such as a password, with something you are (a biometric device such as a fin
yulyashka [42]

Answer:

c. Two-factor authentication

Explanation:

Two-factor authentication is also known as 2FA. It is an extra form of security put in place aside the use of username and password to ensure the authenticity of someone trying to access an online platform with a registered account.

First the user enters his or her username and password, then they will also have to provide some extra information before finally gaining access. Such information could be ones place of birth, name of pet, something one has or know, etc.

2FA helps to still keep an account safe even if a device or password is been stolen. Two-factor authentication could be SMSbased, hardware token, software token, etc.

4 0
4 years ago
Other questions:
  • Colleen is creating a document with two minimal paragraphs of text comparing two business models for her company. She decides to
    14·2 answers
  • Database management systems _____. a. include transaction-processing reports for database analysis b. are used to create, organi
    6·1 answer
  • Chris needs to modify the default bullets that are used in a nonnumbered list in word. Which method should he use?
    9·2 answers
  • An expression using the logical operator ____ will evaluate to true when either of the compound conditions is true.
    6·1 answer
  • Please help with attached file
    8·2 answers
  • Data owners ensure that only the access that is needed to perform day-to-day operations is granted and that duties are separated
    10·1 answer
  • Which of the following allows the transmission of voice and often video communication over the internet?
    12·1 answer
  • PLEASE HELP ASAP!!
    6·2 answers
  • Who invented Satellites? What purpose does it serve? How has it impacted society today?
    11·2 answers
  • Which directory stores the cron configuration file?.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!