1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
geniusboy [140]
2 years ago
8

3. Which swim_backwards method is called when sammy.swim_backwards() is executed? Why?

Computers and Technology
1 answer:
Georgia [21]2 years ago
4 0
Classes called child classes or subclasses inherit methods and variables
You might be interested in
Which of these is a primary and secondary source of market research, respectively?
BigorU [14]
B are primary and C are secondary.
3 0
3 years ago
Read 2 more answers
What job title is used for the person who uses the server operating system to add and remove users, install software, and admini
yan [13]
System Administrator
7 0
3 years ago
which application software allows you to compose written ideas on a computer? database, spreadsheet, word processor or graphics
Kazeer [188]
Word processor because it's more for writing
8 0
3 years ago
What is the correct term for a set of established guidelines for actions (which may be designated by individuals, teams, functio
serg [7]

Answer: Protocol

Explanation: Protocol is the standard that is used in the communication and electronic devices for the communication. Through the mean of the these guidelines the communication is done by the sending and receiving of the data.

This works for the both wired networking and wireless communication which functions under the certain conditions.Examples-TCP(Transmission control protocol), FTP(File transfer protocol) etc.

5 0
3 years ago
In order to view the permissions assigned to each type of user for all the files located in a directory, which of the following
Rufina [12.5K]

The correct answer is B: ls -l.

Further Explanation:

In Linux there is a specific command needed to look at the files in a directory. In addition to using the command ls -l, you will need to use < > after the command and insert the name of the file that is being looked for. For example: ls -l <root root 2356 0600 Oct 22 lanyard>.

Each word and character has their own meaning and access information stored in the database. This will also show the users accesses permission to see the file and if needed to write over the file.

Learn more about computer commands at brainly.com/question/13338803

#LearnwithBrainly

5 0
2 years ago
Other questions:
  • In excel what does sidney need to consider when creating formulas
    7·1 answer
  • How can website illustrate cooperations and kidness?
    8·1 answer
  • Wide area networks are defined by their ability to
    14·2 answers
  • What is one purpose of an algorithm
    14·1 answer
  • Computers are designed with what type of memory?
    13·1 answer
  • Websites can have good content for a particular set of search phrases, yet rank poorly. Issues that may cause this to occur incl
    9·1 answer
  • Activity
    7·1 answer
  • Josh wrote the following e-mail to his co-worker. PLEASE HELP QUWICK
    5·2 answers
  • Find the total cost of a $125 coat purchased in Los Angeles County where the sales tax is 9%. Use the expression c + 0.09c
    10·1 answer
  • What are 2 ways computers can connect to a network?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!