1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ki77a [65]
3 years ago
9

Look at (c), is it accurate? ​

Computers and Technology
2 answers:
alina1380 [7]3 years ago
6 0

heres a real question whats 9 + 10?

Andrews [41]3 years ago
3 0

Answer:

heres a real question whats 9 + 10?

Explanation:

You might be interested in
Use the ______ attribute to configure the browser to render default table and table cell borders.
Sunny_sXe [5.5K]
Use the HTML border attribute to configure the browser to render default table and table cell borders. The HTML border attribute states or specifies if a border is needed to be displayed and shown around the table cells or if they are not essential to be presented on the table cells.<span>
</span>
4 0
3 years ago
2) List three (3) negative impact of Technology on society
Nataly [62]

Answer:

1. social media and mobile devices may lead to psychological.

2. They may contribute to more serious health conditions such as depression.

3. The overuse of technology may have a more significant impact on developing children and teenagers.

Explanation:

may this help you have a good day

5 0
3 years ago
Candace opened an email from a person she didn't know and clicked on a pop-up in the email that installed a virus on her compute
Minchanka [31]

Answer:

Shut down the computer.

Explanation:

l hope it help

4 0
3 years ago
Read 2 more answers
The function below takes a single string parameter: sentence. Complete the function to return a list of strings indicating which
Katena32 [7]

Answer:

import java.util.*;

public class num3 {

   public static void main(String[] args) {

   String sentence = "All good people";

       System.out.println("The vowels in the sentence are ");

       returnVowels(sentence);

   }

   public static void returnVowels(String word){

       String newWord = word.toLowerCase();

       String vowels ="";

       for (int i = 0; i < newWord.length(); i++){

           if(newWord.charAt(i)=='a'||newWord.charAt(i)=='e'||newWord.charAt(i)==i||

           newWord.charAt(i)=='o'||newWord.charAt(i)=='u'){

               vowels = vowels+newWord.charAt(i);

               //System.out.print(newWord.charAt(i)+" ");

           }

       }

     

       String [] chars = vowels.split("");

       Set<String> uniqueVowels = new LinkedHashSet<>();

       for (String s : chars) {

           uniqueVowels.add(s);

       }

       System.out.println(uniqueVowels);

   }

}

Explanation:

In Java

Create the method/function to receive a string as argument

Change the string to all small letters using the toLowerMethod

Iterate through the string using if statement identify the vowels and store in a new String

Since the sentence does not contain unique vowel characters, use the set collections in java to extract the unique vowels and print out

7 0
3 years ago
What type of ransomware was developed to block the user from accessing the computer and encrypts all the files on the user's dev
Mamont248 [21]

Answer: A. CRYPTO-MALWARE

Explanation: Crypto-malware is a type of ransomware that blocks the uses from accessing the computer system,it also encripts all the files.

This type of ransomware is mainly used to demand for ransom.

This type of ransomware which makes use of sophisticated and advanced ransomware technology to ensure that encripting must be with a unique Key or password,the hijacked system is used for crypto mining without the owns consent.

7 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following would an interactive media proffessional must likely need
    9·1 answer
  • Which statement is a good reason for backing up your data to the cloud?
    7·2 answers
  • Which two jobs have high demand need for practitioners( have a skill shortage)
    13·1 answer
  • What type of memory can support quad, triple, and dual channels?
    5·1 answer
  • What is an advantage of using a meta-search engine?
    14·1 answer
  • 1. The best program to present numerical data in would be ____. a. Access c. PowerPoint b. Excel d. Word
    6·1 answer
  • 24. The central processing unit (CPU) consists of two parts which are a. the input and output devices b. the control unit and th
    13·1 answer
  • A user who has special security and access to a system, such as the right to assign passwords, is called a ____.​ a. ​ technical
    8·1 answer
  • The various protocols in use on the internet are said to operate in layers in which the protocol(s) at each layer solve one prob
    5·2 answers
  • What technique is used when setup times at a workstation are sequence dependent?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!