1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tema [17]
3 years ago
10

What does a class do?

Computers and Technology
1 answer:
SSSSS [86.1K]3 years ago
7 0

Answer:

adds color to words

Explanation:

adds color to words

You might be interested in
Why is it important not to leave your personal information on a public computer?
zheka24 [161]

Answer:

B. Someone can steal the information and hurt you.

Explanation:

People can hack into your accounts using your informations and spread hurtful things that can make people hurt. The people will think that you posted this (even if you didn't) and blame you.

7 0
2 years ago
Where are the values the computer is directly working with at a particular moment in time stored?
pav-90 [236]

On the CPU register (?) The CPU registers are registers with small amounts of high-speed memory contained within the CPU. They are used by the processor to store small amounts of data that are needed during processing

Hope this helps and that you have a good day

4 0
3 years ago
Que problema se puede usar con el uso de las TIC ?​
raketka [301]
We do not speak English in this please translate in Google because we do not know Spanish
8 0
3 years ago
The possibility of devices outliving a manufacturer, leaving them without long-term support against vulnerabilities is a possibl
Dafna11 [192]

Answer: Security (updating of software and hardware)

Explanation:

Internet of Things is one of the latest inventions in technology wherein smart objects and devices can connect to the internet and also share information within that space.

One of the several challenges of the Internet of Things is Security. Because of the introduction of the Internet, there is a vulnerability to hacking. Upgrades, therefore ought to be regularly provided so as to prevent hackers from recognizing patterns and hacking into them. So when the device outlives the manufacturer, there would be no one to provide regular updates thus making the device vulnerable.

8 0
4 years ago
Guided transmission media employ an antenna for transmitting through air or vacuum.
olganol [36]

Answer: False

Explanation:

Unguided medium employs an antenna for transmitting through air or vacuum.

For guided mediums the transmission is in the form of twisted copper wires, shielded twisted copper wire and optical fibres. They henceforth do not depend upon antennas for transmission through air using antennas.

5 0
4 years ago
Other questions:
  • Gathering information with your eyes is called
    13·2 answers
  • Which of the following statements is false?a.Unethical behavior is always illegal.b.Ethical decisions are usually influenced by
    12·1 answer
  • Please write down a java program for below instruction.Min-Heap: Construct a Min_Heap from the following set of integers. Rememb
    5·1 answer
  • What is the Documenter?
    10·1 answer
  • Obtaining the data of a video file from a flash drive is an example of a(n) _________ operation.
    6·1 answer
  • In the code snippet, what is the “win” part called in programming?
    12·1 answer
  • What symbol is used for an assignment statement in a flowchart?
    8·1 answer
  • Write a number guessing game. The game should have a default 1-100 picking system. Have the user guess the number the computer p
    12·1 answer
  • Electronic mail is a
    9·1 answer
  • This is due in like an hour but I'm confused so please do lend assistance
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!