1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maw [93]
2 years ago
6

The String otherObjects() method relies on the ____________.

Computers and Technology
1 answer:
kolbaska11 [484]2 years ago
7 0
B name.equals() method
You might be interested in
How would you describe the relationship between blocks of code and commands?<br>HELP​
Karolina [17]

Answer:

Code and Commands have similar programs coding has only one thing to do or done but commands can be told anytime by an input device.

Explanation:

hope this helps.

7 0
3 years ago
Which three staements about gravity and the formation of the solar system are true?
Yuliya22 [10]

Answer:Gravity held the pieces of forming planets together. Gravity pulled most of the matter into the center of the solar system Gravity caused the planets and Sun to have spherical shapes.​

Explanation:

7 0
3 years ago
A _____ is a valuable tool that enables a user to find information on the Web by specifying words or phrases known as keywords,
svetoff [14.1K]

Answer:

Search Engine

Explanation:

A search engine refers to a computer application software that looks through and locates items in a database. These items will correspond to to the phrases or keywords being searched for that has been entered by a user.

On the internet or web, popular search engines are provided by google and yahoo and they are designed to carryout web search when users enter search query as keywords or phrases

8 0
3 years ago
Read 2 more answers
__________ implements a security policy that specifies who or what may have access to each specific system resource and the type
malfutka [58]

Answer: Access control

Explanation:

Access control implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance.

A typical example of this is in ERPs where access controls defines what access codes a process owner has and what access a reviewer and an approval has. Where a personnel has access to carry out a transaction, review and approve the transaction, access controls are said to be deficient.

The right answer is Access control

Hope this helps!!

6 0
3 years ago
Who is the smartest avenger??? :)
Rom4ik [11]

Answer:

Iron Man

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • A friend knows I'm taking a technology class in college and asks me how a hard drive works. What should I say to a friend about
    10·1 answer
  • I need help with Microsoft.
    6·1 answer
  • When you use your fingerprint on a reader attached to your computer to authenticate yourself as the legitimate computer user, wh
    6·1 answer
  • What is stored in alpha after the following code executes?
    8·1 answer
  • What happens if i unplug my alarm system?
    11·1 answer
  • Which scenario describes unethical lab behavior?
    9·1 answer
  • Which statement describes what happens when a user configures No Automatic Filtering in Junk Mail Options?
    5·1 answer
  • Can you withdraw from courses in top hat?
    14·1 answer
  • 8. Cloud Storage is
    5·2 answers
  • I need help with computer science<br> the quiz on e2020 is on hackers and unauthorized access
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!