1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleks [24]
3 years ago
5

1. Define the term M.A.N.

Computers and Technology
2 answers:
steposvetlana [31]3 years ago
4 0

Answer:

The term M.A.N is like you know like a human just like the term W.O.M.A.N.

Hope this helps have a good day.

jeyben [28]3 years ago
4 0
He is right I got it correct Thanks:)
You might be interested in
Which one can be used as watermark in a word document?​
otez555 [7]

Answer:

On the Design tab, select Watermark.

In the Insert Watermark dialog, select Text and either type your own watermark text or select one, like DRAFT, from the list. Then, customize the watermark by setting the font, layout, size, colors, and orientation. ...

Select OK.

4 0
3 years ago
Write method reverseString, which takes a string str and returns a new string with the characters in str in reverse order. For e
son4ous [18]

Answer:

The method written in Java is as follows:

public static String reverseString(String str){

    String result = "";

    int lentt = str.length();

    char[] strArray = str.toCharArray();

       for (int i = lentt - 1; i >= 0; i--)

           result+=strArray[i];

    return result;

}

Explanation:

This defines the method

public static String reverseString(String str){

This initializes the result of the reversed string to an empty string

    String result = "";

This calculates the length of the string

    int lentt = str.length();

This converts the string to a char array

    char[] strArray = str.toCharArray();

This iterates through the char array

       for (int i = lentt - 1; i >= 0; i--)

This gets the reversed string

           result+=strArray[i];

This returns the reversed string            

    return result;

}

<em>See attachment for full program that includes the main method</em>

Download txt
3 0
3 years ago
A user complains because the social media apps on his mobile device always note his location. The user is worried about privacy,
stich3 [128]

Answer:

Geotracking feature needs to be adjusted.

Explanation:

5 0
3 years ago
14. Under the von Neumann architecture, a program and its data are both stored in memory. It is therefore possible for a program
irinina [24]

Answer:

Explanation:

This sort of scenario can be very problematic for a programmer. When writing code, pieces of code are designed to connect with each other and depend on specific information provided by other blocks of code. If one of these blocks of code or programs modifies itself and changes even the smallest value, then the code will output a completely different value or instruction that was intended by the programmer when initially creating the code. This tiny change can cause the entire code/program to fail and give an error that would be very difficult to fix.

6 0
3 years ago
Does anyone know were the (021) key is on Windows 10?
pashok25 [27]

Answer: maybe do this 3425+ENTER

Explanation:

6 0
3 years ago
Other questions:
  • Samantha was calculating a mathematical formula on an electronic spreadsheet. She used multiple values to recalculate the formul
    8·2 answers
  • Plz help meeeeee QUICKLY!!! WORTH 15 POINTS!
    15·1 answer
  • What is hydraulic fracturing?
    7·1 answer
  • What are the examples of shareware?
    9·2 answers
  • 2.1. The stream cipher described in Definition 2.1.1 can easily be generalized to work in alphabets other than the binary one. F
    10·1 answer
  • Presses the Schedulr app icon Selects the list item for CSCI 448 Presses the "View Classroom on Map" button While only performin
    11·1 answer
  • You will be creating a program that implements the Observer design pattern. This design pattern is utilized in almost all GUI sy
    10·1 answer
  • I ONLY HAVE 5 MIN HELPPPPPP
    15·2 answers
  • How to assign some object key values to other name react const.
    7·1 answer
  • which two statements about incoming and outgoing interfaces in firewall policies are true? (choose two.)
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!