1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexandr1967 [171]
3 years ago
7

Which of the following calculations would evaluate to 12?

Computers and Technology
1 answer:
lidiya [134]3 years ago
8 0

Answer:

the answer for this is 3*(6+2)/2)

You might be interested in
What is an example of new technology having a negative impact on sustainability?.
Talja [164]

An example of new technology having a negative impact on sustainability is the use of computer automation to shut down unused electronic devices.

<h3>What is technology?</h3>

Technology can be defined as a field of science that involves the process of creating, applying, and managing scientific knowledge and ideas, so as to effectively and efficiently proffer solutions to various problems and cause an improvement in human life.

<h3>What is a computational sustainability?</h3>

Computational sustainability can be defined as a process through which societal, economic, ecological and societal resources are balanced for the future well-being of humanity, especially by developing computational models and using mathematical and information science techniques.

In this context, we can infer and logically deduce that an example of new technology having a negative impact on sustainability is the use of computer automation to shut down unused electronic devices.

Read more on computational sustainability here: brainly.com/question/25719495

#SPJ1

6 0
2 years ago
The following code accomplishes which of the tasks written below? Assume list is an int array that stores positive int values on
liq [111]

Answer:

It stores the largest value in list (the maximum) in the variable 'foo'.

Explanation:

<u>Following are the description of the answer</u>:

In the above code, they set and initialize the integer data type variable that is 'foo' to 0. Then, they set the for loop that iterates from 0 and end at length of the list. Then, they check the condition, if the list of j i.e., list[j] is greater than the variable 'foo', then the value of the list[j] stored in the variable 'foo'.

So, if the value of the list[j] is greater than 0, then the value of the list[j] is initialized in the variable 'foo'. That's why it stores the largest value.

6 0
3 years ago
Neview of related literature happens in two wayo (1) Traditional and
Greeley [361]

Answer:

I dont know the question all i know is the answers or whatever

Explanation:

8 0
3 years ago
Write a method named showChar. The method should accept two arguments: a reference to a String object and an integer. The intege
matrenka [14]

A complete program with the method ShowCar:

import java.util.Scanner; // header file

public class ShowChar

{

public static void main(String[] args)

{

String lnOfText;

int i;

Scanner input = new Scanner(System.in);

System.out.print("Enter a line of text:");

lnOfText = input.nextLine();

System.out.print(" Enter your index: ");

i = input.nextInt();

show_Char(lnOfText,i);

}

public static void show_Char(String str_a, int i)

{

System.out.print(str_a.charAt(i));

}

}

In this program, both the inputs ie. a sentence or line of text as well as the index position is obtained. A method is written to find the string at that particular position. Finally the method prints that character at the particular index.

5 0
3 years ago
What job does a front-end developer perform?
alina1380 [7]

Answer:

They manage making websit/es beautiful. Basically how brainly is setup? The layout is nice? Front end developers are responsible for why webpages look pretty or nicely done. <em>fun fact, my dream job is a front end developer!</em>

5 0
2 years ago
Other questions:
  • Combination keys perform a function when held down in combination with another key. true or false
    9·1 answer
  • Intranets are typically set up behind a firewall. <br> a. True <br> b. False
    15·1 answer
  • Which of the following is the net effect of the following combination of share and NTFS permissions when the share is accessed o
    7·1 answer
  • Rerouting traffic using arp poisoning is an attack on ________ of a network.
    8·1 answer
  • Write a program that will take a user-input number and then display all of the whole # factors for that number. For example, if
    13·1 answer
  • In a folder hierarchy, the top level is referred to as which of the following?
    7·1 answer
  • In which of the following work situations would word processing software be most appropriate to make the task easier?
    6·1 answer
  • In which area is composing for games similar to composing for
    14·1 answer
  • create a function that draws a certain number of spaces, followed by a certain number of stars, followed by a newline.
    6·1 answer
  • What is the quickest way to change the format of a table?
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!