1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
viva [34]
3 years ago
11

Davingould1115...................answer 2​

Computers and Technology
2 answers:
Liono4ka [1.6K]3 years ago
6 0

Answer:

srry I didn't understand

KiRa [710]3 years ago
4 0

Answer:

who is that

Explanation:

You might be interested in
In the picture below
zhuklara [117]

Answer:

The answer is "It is a public method in the Car class".

Explanation:

In this question, the fourth choice is correct because the accessor method will be public, and the incorrect choice can be defined as follows:

  • The first and second choice was wrong because the class name is "Car".
  • In the third choice, it is wrong because the method will not be private.
  • In the fifth choice, it is wrong because the object name "mustang".
7 0
3 years ago
……………………is one of the most popular cloud storage facilities.​
lord [1]
Chcgzrsfchvuvjbnkggvbbb.
4 0
3 years ago
entry that has the address of 192.168.101.0 and the wildcard mask of 0.0.0.255. What is the range of IPv4 addresses that will be
svp [43]

Answer:

192.168.101.0 through 192.168.101.255 is the correct answer.

Explanation:

The following answer is correct because the address of the ACL entry is 192.168.101.0 and 0.0.0.255 is the wildcard mask then, the range of the IPv4 addresses is 192.168.101.0 through 192.168.101.255 that affected by the ACL.

ACL is referred as the access control list that acts as the firewall which secures the VPC network of the user.

6 0
3 years ago
A sentinel value ________ and signals that there are no more values to be entered:____
Hoochie [10]

Answer:

The answer is "Option b".

Explanation:

Sentinel [..] is a special value, which existence ensures the end of a loop, which performs structured data. It allows the information end to be identified where no other means are available for this, and wrong choices can be described as follows:

  • In option a, It is a special value, not a data type, that's why it is not correct.
  • Option c and Option d both were wrong because, It is an empty list, and it can't indicate the starting point of the list and guards the list.  
5 0
4 years ago
Which sentence in the passage shows an effective way to protect your document from misuse? Claire has saved her research paper o
goblinko [34]

Answer: She sets an access password while saving the file. hope this helps!!!!

Explanation:

4 0
3 years ago
Other questions:
  • Please I need all the help I can get Thank You So Much
    14·1 answer
  • • Two advertisers A and B
    8·1 answer
  • A methods and measurements analyst for Digital Devices needs to develop a time standard for the task of assembling a computer mo
    15·1 answer
  • A developer needs to create a visualforce page that displays case data. The page will be used by both support reps and support m
    10·1 answer
  • Give several reasons why Python is such a great programming language. Explain how Python is related to flowcharts. (students mak
    9·1 answer
  • Which was the first arcade game that was adapted for mobile phones ????
    13·1 answer
  • Sam wants to move across the text and his documents to add data at predefined stops. Which key will Hughes to navigate through t
    6·1 answer
  • A palindrome is any word, phrase, or sentence that reads the same forward and backward. Here are some well-known palindromes: Ab
    11·1 answer
  • List the caveats to this analysis and how they affect the research. How does this document define the ""typical game developer""
    7·2 answers
  • Which item is developed last in the cyclical process?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!