1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleksandr [31]
3 years ago
9

I found a brand-new charger wire still in its plastic package, but it's six years old and has never been used. Is it safe to use

?
Computers and Technology
1 answer:
Oduvanchick [21]3 years ago
3 0

Answer:

Yes it should be safe

Explanation:

hope it helps :)

You might be interested in
In wheat, kernel color is determined by additive alleles at two unlinked loci. If two plants, one with dark red kernels (+++– ge
Shalnov [3]

Answer:

50 %

Explanation:

Alleles in dark red kernels:  ++ and +-

Alleles in light red kernels:  +- and --

genetic cross will result in off springs: +++- ; ++--, +-++,  +-+-

Hence 50% offspring will have phenotypes different from parental colors

5 0
3 years ago
How many tens are there in the number 156?<br> A. 1<br> B. 15<br> C. 6<br> D. 56
dexar [7]

Answer:

15

Explanation:

15 times 10 is 150, therefore there is 15 tens inside 156.

7 0
3 years ago
Read 2 more answers
How are procedural and object-oriented programming approaches similar?
masya89 [10]

Answer:

A. Both approaches are used when writing programs.

Explanation:

Procedural programming (PP), also known as inline programming takes a top-down approach. It is about writing a list of instructions to tell the computer what to do step by step. It relies on procedures or routines. Object-oriented programming (OOP) is about encapsulating data and behavior into objects.

Hope this helps....

Have a nice day!!!!

4 0
3 years ago
Consider the following process for generating binaries. A compiler is used to generate the object code for individual modules, a
Taya2010 [7]

Answer:

The answer of this question is described in the explanation part.

Explanation:

  • The connection operator will substitute unresolved conceptual addresses with the real addresses aligned with either the end system decimal parameters.
  • To do this, the modules should keep records of directives which relate to ambiguous signals.
  • In the relating, each configuration in the application framework binary is assigned a pattern of domain names.
  • This has been done, problematic connections to objects imported by this unit may be substituted in other frameworks because each other system would contain the set of instructions to be repaired for.

7 0
3 years ago
Create a method called nicknames that passes an array as a parameter. Inside the method initialize it to hold 5 names of your ch
Gre4nikov [31]
<h2>Answer:</h2>

    //======METHOD DECLARATION=========//          

    //method name: nicknames                                          

    //method return type: void                                            

    //method parameter: an array reference                    

    public static void nicknames(String [] names){      

       //initialize the array with 5 random names              

       names = new String[] {"John", "Doe", "Brian", "Loveth", "Chris"};

       //using an enhanced for loop, print out the elements in the array

       for(String n: names){

           System.out.print(n + " ");

       }

       

    }

<h2>Explanation:</h2>

The program is written in Java. It contains comments explaining important parts of the code. Kindly go through these comments.

A few things to note.

i. Since the method does not return any value, its return type is <em>void</em>

ii. The method is made public so that it can be accessible anywhere in and out of the class the uses it.

iii. The method is made static since it will most probably be called in the static main method (at least for testing in this case)

iv. The method receives an array of type <em>String </em>as parameter since the names to be stored are of type <em>String</em>.

v. The format of initializing an array manually should follow as shown on line 7. The <em>new</em> keyword followed by the array type (String), followed by the square brackets ([]) are all important.

vi. An enhanced for loop (lines 9 - 11) is a shorthand way of writing a for loop. The format is as follows;

=> The keyword <em>for</em>

=> followed by an opening parenthesis

=> followed by the type of each of the elements in the array. Type String in this case.

=> followed by a variable name. This holds an element per cycle of the loop.

=> followed by a column

=> followed by the array

=> followed by the closing parenthesis.

=> followed by a pair of curly parentheses serving as a block containing the  code to be executed in every cycle of the loop. In this case, the array elements, each held in turn by variable n, will be printed followed by a space.

A complete code and sample output for testing purposes are shown as follows:

==================================================

public class Tester{

    //The main method

    public static void main(String []args){

       

       String [] names = new String[5];

       nicknames(names);

    }

   

  //The nicknames method

    public static void nicknames(String [] names){

       names = new String[] {"John", "Doe", "Brian", "Loveth", "Chris"};

       for(String n: names){

           System.out.print(n + " ");

       }

       

    }

}

==================================================

<h2>Output:</h2>

John Doe Brian Loveth Chris

<em>NB: To run this program, copy the complete code, paste in an IDE or editor and save as Tester.java</em>

6 0
3 years ago
Other questions:
  • The first thing to do when your computer gives you a error message is
    7·2 answers
  • Modify your solution to Problem 8.24 so that one (and only one) child installs a Segmentation-fault handler which prints an erro
    10·1 answer
  • Write a program that reads a stream of integers from a file and writes only the positive numbers to a second file. The user shou
    5·1 answer
  • Which of the following is not true about a computer byte? A) It is made up of 8 bits. B) Each letter of the alphabet is stored i
    15·1 answer
  • When gathering information, which of the following tasks might you need to
    13·1 answer
  • The data type of 17.3 should be ________________.
    12·2 answers
  • Which types of online reading tools are available within the CloseReader? Check all that apply.
    11·1 answer
  • Mention any
    14·1 answer
  • The BCD number for decimal 473 is( ). a) 111011010; b) 010011110011; c) 010001110011; d)0010110110​
    15·1 answer
  • What does the asterisk (*) after select tell the database to do in this query?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!