1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zavuch27 [327]
3 years ago
11

How do you get The gold chip on Megaman x3 snes I want To know

Computers and Technology
1 answer:
strojnjashka [21]3 years ago
5 0

Answer:

no clue lol

Explanation:

You might be interested in
Which statement is false? Classes are reusable software components. A class is to an object as a blueprint is to a house. Perfor
Korolek [52]

Answer:

The last option i.e "A class is an instance of its object" is the correct answer of this question.

Explanation:

A class is a collection of variable and method . The class is the blueprint of the object that means class is physical space entity and object is a runtime space entity.It is the the reusability feature of the programming component.

Following are the  syntax to declare any class.

                     Class classname

<u>For Example</u>: class test1

With the help of class we can achieve the inheritance, encapsulation and abstraction etc.

All the other options except the last one are correct option. Because option(1), option(2) and option(3) follow the property of class and object .  that's why last option is False.

4 0
3 years ago
Which of the following hacker attacks against wireless networks are virtually undetectable?
Ede4ka [16]

Answer: A. passive attacks

Explanation:

Passive attack is a type of attack where by a system is tracked and scanned to determine how vulnerable it is and to also detect open port. The major purpose of a passive attack on a network is to gain access to the information of the target without altering the data.

A passive attack on a network may not be necessarily malicious, it is a type of network attack that is very difficult to detect.

Methods of carrying out passive attacks.

•War driving: scanning of networks is carried out to detect Wi-Fi that are vulnerable.

•Dumpster driving: Attackers or intruders search for information from discarded computers and

other gadgets, those information can help to attack a network.

7 0
4 years ago
When you were configuring Encrypting File System (EFS) in the lab, a __________ on the Documents folder in the File Explorer ind
harina [27]
I’m not 100% sure but I think it’s a padlock that represents it
3 0
4 years ago
Which line in the following program will cause a compiler error? #include using namespace std; int main() { int number =5; if (n
DanielleElmas [232]

Answer:

  1. #include  <iostream>
  2. using namespace std;
  3. int main() {
  4. int number =5;
  5. if (number>=0&& number <=100){
  6.    cout<<"passed.\n";
  7. }
  8. else{
  9.    cout<<"failed.\n";
  10. }
  11. return 0;
  12. }

Explanation:

There where multiple errors in the code given in the questions

Line 1: Missing <iostream>

Line 5: The comparison operator was wrong correction is highlighted

Line 12 Missing closing brace for the main function

All the errors have been fixed and the code above compiles

4 0
3 years ago
In this exercise you will debug the code which has been provided in the starter file. The code is intended to do the following:
abruzzese [7]

Answer:

The corrected code is as follows:

import java.util.Scanner;

public class U2_L4_Activity_Two{

public static void main(String[] args){

Scanner scan = new Scanner(System.in);

String str1 = scan.nextLine();

String str2 = str1;

str1 = str1.toUpperCase();

System.out.println(str1);

System.out.println(str2);

}

}

Explanation:

This corrects the scanner object

Scanner scan = new Scanner(System.in);

This line is correct

String str1 = scan.nextLine();

This copies str1 to str2

String str2 = str1;

This converts str1 to upper case

str1 = str1.toUpperCase();

This prints str1

System.out.println(str1);

This prints str2

System.out.println(str2);

8 0
3 years ago
Other questions:
  • Problem 2 (40 points)-Write a program. Submit a file named weight.cpp Create a program that continuously allows a user to enter
    5·1 answer
  • I really need help please abari is writing a program which prompts a user for a value without a decimal. Which function should h
    8·1 answer
  • A new company is upgrading a media workstation. The computer will be predominantly used for graphic intensive presentations, sli
    13·1 answer
  • In what year was google launched on the web?
    14·1 answer
  • What statement best decribes the relashionship bewteen science and technoligy?
    11·2 answers
  • Many people keep time using a 24 hour clock (11 is 11am and 23 is 11pm, 0 is midnight). If it is currently 13 and you set your a
    10·1 answer
  • To communicate with an expansion card, one part of the ____ bus runs between RAM and the processor; the other part runs between
    13·1 answer
  • I’m nobody. Who are you?
    9·2 answers
  • A _________ is a task at the lowest level of the WBS that represents the level of work that the project manager uses to monitor
    5·1 answer
  • Collisions occur when one output is mapped to two inputs. <br><br> A. True <br> B. False
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!