1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
max2010maxim [7]
3 years ago
10

Shang chi Critique (6-8 sentences)

Computers and Technology
1 answer:
melisa1 [442]3 years ago
5 0

Explanation:

.......................

You might be interested in
Why it's important for designers to consider the environmental impact of a<br> product they design.
Aloiza [94]

Answer:

Kindly check explanation

Explanation:

The environment is our abode which aids the continued survival and growth of plant, animals and humans. The most important components and natural resources which are neceaaaarybto dwell and survive are all waht a makes up an enviromment. The energy derived from the sun aids power generation, plant growthbduring photosynthetic activities which is rewired to produce crops and feed us. The air we breathe are all a part of our enviromment. Therefore, such environment which provides a canvas or platform for our existence must be greatly cared for and no technological innovation, project or design must be allowed to impact negatively on the enviromment. Thus the need for impact assessment of systems in other to ensure that our abode isn't threatened.

4 0
3 years ago
Which of the following best describes compounds.
Lemur [1.5K]
A. They can only be separate chemically
4 0
3 years ago
An investigator responsible for tracking e-mail communication would begin by locating what
Ainat [17]
Email headers contains information about email
6 0
3 years ago
What are experts in technology who use their knowledge to break into computers and networks, for profit or just as a challenge k
insens350 [35]

Answer:

Hacker

Explanation:

Hacker -

It refers to the computer software expert , who is responsible to break into the unauthorized networks or computer , is referred to as a hacker .

The hacker is skilled with exceptional computer and computer software knowledge .

Hacking is an illegal practice , as the person is able to access some confidential and personal data and information of any other person or organisation .

Hence , from the given information of the question ,

The correct term is hacker .

3 0
3 years ago
Write a program that calculates the average rainfall for three months. The program should ask the user to enter the name of each
sergeinik [125]

Answer:

// program in C++.

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

   // string array

   string m[3];

   // array to store rainfall

   double rainfall[3];

   // variables

   double avg_rainfall,sum=0;

   

   for(int i=0;i<3;i++)

   {

       cout<<"Enter name of month "<<i+1<<" :";

       // read month name

       cin>>m[i];

       cout<<"Enter rainfall (inches)  in month "<<i+1<<" :";

       // read rainfall

       cin>>rainfall[i];

       // sum of rainfall

       sum+=rainfall[i];

   }

   // Average rainfall

   avg_rainfall=sum/3;

   // print Average rainfall

   cout<<"Average rainfall for "<<m[0]<<","<<m[1]<<","<<m[2]<<" is "<<avg_rainfall<<" inches."<<endl;

return 0;

}

Explanation:

Create string array "m" to store name of month and double array "rainfall" to store rainfall. Read name of 3 months and rainfall in that month.Find the sum of all the rainfall  and the average rainfall.Print the average rainfall of 3 months.

Output:

Enter rainfall (inches)  in month 2 :45                                                                                    

Enter name of month 3 :july                                                                                                

Enter rainfall (inches)  in month 3 :43                                                                                    

Average rainfall for may,june,july is 42.6667 inches.

4 0
3 years ago
Other questions:
  • Using refracted laser light to store data on a photoreceptive substrate is essentially how ___ storage works. Theoretically this
    5·1 answer
  • What is ment by creative middle way solution
    6·1 answer
  • Which of the following grinding methods is best suited to a shorter cylindrical workpiece?
    8·1 answer
  • 0001 0000 1100 0011 (unsigned, that is, interpreted as b2u)i.8 bit truncated value:ii.does the value change when truncated to 8
    7·1 answer
  • You are the IT administrator for a small corporate network. Recently, you added a web server that runs services that need to be
    12·1 answer
  • Qbasic program to accept 10 numbers and to find their sum. <br>​
    7·1 answer
  • Write the definition of a method printDottedLine, which has no parameters and doesn't return anything. The method prints to stan
    12·1 answer
  • Why is distance learning better
    12·2 answers
  • What is the output of the following code?<br> print (12 // 6)
    12·1 answer
  • A data visualization tool that updates in real time and gives multiple outputs is called
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!