1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
V125BC [204]
3 years ago
9

Pls help I will mark you the brainliest

Computers and Technology
2 answers:
ehidna [41]3 years ago
6 0

Answer:

c

Explanation:

nekit [7.7K]3 years ago
6 0

Answer:

Functionality is more important

Explanation:

Because even if something looks nice dosent mean it will work properly. Take the game cyberpunk for example even though it looked nice it had a lot of bugs which made everything else irrelavant.

You might be interested in
If classes C1 and C2 both implement an interface Cint, which has a method whichIsIt, and if C1 c = new C1( ); is performed at on
Assoli18 [71]

Answer:

FALSE

Explanation:

Because C1 and C2 implement the same interface, they both implement whichIsIt. The variable c is known as a polymorphic variable, meaning that it can change from being an C1 to a C2. So, the message c.whichIsIt( ); may invoke C1's whichIsIt or C2's whichIsIt. This can only be known at runtime.

5 0
3 years ago
Biometric devices are often associated with computer and data security. True False
Leya [2.2K]

Answer:

True

Explanation:

5 0
3 years ago
If the VLOOKUP function is used to find an approximate match, what will it return if there is no exact match?
grigory [225]

Answer:

Its C

Explanation:

The largest value that is less then the lookup value

6 0
3 years ago
External network security threats can include management failure to support organization-wide security awareness, inadequate sec
Ganezh [65]

Answer:

The answer is "Option B".

Explanation:

In external networking, it establishes the informal links beyond the size of the firm, which supports its career, and these networks may be used for help, invaluable guidance.

This system would be a different point of view to provide the privacy protection for the system connectivity, and in the internal system protects its system protects all its data, that's why it is false.

6 0
3 years ago
Only one indented line of code will be executed after an if statement. True False
leva [86]

Question: Only one indented line of code will be executed after an if statement. True False

Answer: False

3 0
2 years ago
Other questions:
  • Which program or security application prevents access between a private and trusted network, and other untrusted networks?
    8·2 answers
  • Which resource helps a user access a cloud service?
    8·1 answer
  • Match each keyboard command with its result.
    6·1 answer
  • What is does ram means,??
    7·2 answers
  • The minimum spanning tree of an undirected graph G exists if and only if G is connected. True or False?
    12·1 answer
  • HURRY
    8·1 answer
  • When you type in text in an image in a photo-editing software, where is it created?
    8·1 answer
  • You can set the margin using the rular also true or false​
    13·1 answer
  • Answer pls pls pls pls pls ​
    9·1 answer
  • Suppose your team is finishing a project and the supervisor stresses ensuring the material cannot be erased. To what memory leve
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!