1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
inna [77]
2 years ago
8

Select the phrases that apply to Java classes or methods.

Computers and Technology
1 answer:
oee [108]2 years ago
7 0

Answer:

graficar una lista de entradas

graficar una lista de entradas

crear un nuevo objeto

condiciones de prueba

romper un ciclo

romper un ciclo

Explanation:

You might be interested in
¿Qué diferencia existe entre un virus biológico y virus informático?
ddd [48]

Answer:

i dont know spanish but i am gussing that you want to find differnce in virus information?

Explanation:

6 0
2 years ago
An intruder with malicious intent breaks into an office and steals a hard drive
kakasveta [241]

Answer: data security

Explanation:

The company's authentication protocols and data encryption measures denotes data security.

Data security simply means protecting unauthorized people from having access to a particular data. This is done to prevent unauthorized access of important information or to prevent fraud. Some of the data security measures include data encryption, tokenization, hashing, etc.

4 0
3 years ago
1. What does the term 'in season' mean?
yKpoI14uk [10]
Available at the time of year.
8 0
3 years ago
Read 2 more answers
What is a risk or an effect of software piracy?
Butoxors [25]
Piracy is a term used to describe the practice of obtaining or using software in a manner that is illegal or not in keeping with the terms under which the software was distributed. This can range from purchasing or copying the software, to using the software without a license, to selling, renting, or otherwise distributing it without authorization.<span>The Business Software Alliance estimated the losses to software companies in 2005 as a result of piracy at over $30 billion.</span>
5 0
3 years ago
Read 2 more answers
What is the database and presentation for files​
Nutka1998 [239]

Answer:

Database Management System ppt DBMS

I don't know if that is right. Sorry if it's not.

6 0
2 years ago
Read 2 more answers
Other questions:
  • a supermarket having a sale on canned foods' the sale includes 12 cans of soup for 10.65 what is the unit price per can of soup
    6·2 answers
  • What are six external parts of a computer
    11·1 answer
  • Can I change my brainly username?
    9·2 answers
  • The theory of logic set the foundation for what aspect of computing today?
    11·1 answer
  • The Marketing Department for CSM Tech Publishing is busy producing videos and print materials (stored in PDF format) for distrib
    6·1 answer
  • What does SFA software provides tools for
    11·2 answers
  • Please help me on this I don't know which one they are​
    6·2 answers
  • How to use 2 tabs at once on my Lenovo yoga book?​
    9·1 answer
  • How is data written to a blockchain?
    10·1 answer
  • As a technical support rep, michael is responding to a customer's question sent to him via e-mail. what should michael's first t
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!