1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex73 [517]
2 years ago
7

PLSS HELP ASAP ILL GIVE BRAINLIES THANKS

Computers and Technology
2 answers:
Umnica [9.8K]2 years ago
8 0

Answer:

C

Explanation:

The class declaration component declares the name of the class along with other attributes such as the class's superclass, and whether the class is public, final, or abstract. At minimum, the class declaration must contain the classkeyword and the name of the class that you are defining.

Bezzdna [24]2 years ago
8 0
C I think if anything since the other ones do not make as much sense.
You might be interested in
Which Internet security risk is associated with dumpster diving?
lora16 [44]

Which Internet security risk is associated with dumpster diving? Identity theft. Identity theft is associated with dumpster diving because it involves taking something from someone else. In this case, instead of looking through a dumpster to get items that were someone elses, they are taking their identity and using it for their own purposes. So identity theft and dumpster diving relate when used in this context.

3 0
4 years ago
Read 2 more answers
In Scratch, you have to choose backdrops from a limited number in the Scratch image library.
forsale [732]
I would say it would be True
5 0
3 years ago
What are Excel Formulas used for?
Charra [1.4K]

Answer:

Explanation:aaaaaaa

3 0
3 years ago
Which factor can hinder problem solving?
Bess [88]

Answer:

Thinking like a Child

Explanation:

Bruh moment

8 0
4 years ago
Write a complete program that: 1. Prompt the user to enter 10 numbers. 2. save those numbers in a 32-bit integer array. 3. Print
FrozenT [24]

Answer:

see explaination

Explanation:

oid changeCase (char char_array[], int array_size ) {

__asm{

// BEGIN YOUR CODE HERE

mov eax, char_array; //eax is base image

mov edi, 0;

readArray:

cmp edi, array_size;

jge exit;

mov ebx, edi; //using ebx as offset

shl ebx, 2;

mov cl, [eax + ebx]; //using ecx to be the storage register

check:

//working on it

cmp cl, 0x41; //check if cl is <= than ASCII value 65 (A)

jl next_indx;

cmp cl, 0x7A; //check if cl is >= than ASCII value 122 (z)

jg next_indx;

cmp cl, 'a';

jl convert_down;

jge convert_up;

convert_down:

or cl, 0x20; //make it lowercase

jmp write;

convert_up:

and cl, 0x20; //make it uppercase

jmp write;

write:

mov byte ptr [eax + ebx], cl //slight funky town issue here,

next_indx:

inc edi;

exit:

cmp edi, array_size;

jl readArray;

mov char_array, eax;

// END YOUR CODE HERE

}

}

7 0
3 years ago
Other questions:
  • The pseudo-class selectors for links let you use CSS to change the formatting for all but one of the following. Which one is it?
    12·1 answer
  • Write a multi-paragraph Informational essay about a current event in the news. You can develop your topic using
    8·2 answers
  • Question 19 :Rachel, a database administrator, has created a database for her website. It contains pictures of vacations that pe
    13·1 answer
  • The Windows Operating System: A) is a web-based operating system for the Internet era. B) is a data management application used
    15·1 answer
  • Differentiate between CD-ROMS and DVD-ROMS​
    8·1 answer
  • What is the role of a design tWhat is the role of a design tool in a Robotic Process Automation (RPA) solution?
    9·1 answer
  • WHAT DOES THE SCRATCH CODE BELOW DO?
    7·1 answer
  • What does it mean that the right mouse button is context-sensitive?
    15·1 answer
  • Please i need your help
    12·1 answer
  • ravi met few peoples in a party and was mixing up well those wearing expensives clothing and fair complexion . which factors are
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!