1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Xelga [282]
2 years ago
5

state an application that would be better to write c++ than java and give a rationale for your answer

Computers and Technology
1 answer:
Alexxandr [17]2 years ago
6 0
Microsoft Visual Studio is the best deal
You might be interested in
VSphere Client is used to install and operate the guest OS. true or false
tangare [24]

Answer:

True

Explanation:

A guest Operating System (OS) is a secondary OS to the main installed OS which is the host Operating System (OS). Guest OS can either be a part of a partition or a Virtual Machine (VM). This guest OS is used as a substitute to the host OS.

vSphere Web Client can be installed by using a CD-ROM, DVD or ISO image which has the installation image to make a Virtual Machine (VM) functional.

5 0
3 years ago
You can view the existing Access Control Lists for a set of folders on a Windows system by right-clicking the folder you want to
NikAS [45]

Answer:

And clicking the security tab option.

Explanation:

Lets explain what an object's ACL is. I will use an example to best explain this. Let's suppose that user Bob would want to access a folder in a Windows environment. What supposedly will happen is that Windows will need to determine whether Bob has rights to access the folder or not. In order to do this, an ACE with the security identity of John will be created. These ACEs are the ones that grant John access to the folder and the ACLs of this particular folder that John is trying to access is a list of permissions of everyone who is allowed to access this folder. What this folder will do is the to compare the security identity of John with the folders ACL and determine whether John has Full control of the folder or not.

By right clicking the folder and selecting the security tab, John will be in a position to see a list of the permissions (ACLs) granted to him by the folder.

3 0
3 years ago
Why does angular page look different after refresh.
alukav5142 [94]
Most of the web applications are written with SPA frameworks such as Angular, React, Vue.js, etc. The problem with these SPAs is that the single page is loaded in the browser once and then the framework will take care of all the routing among pages and gives the impression to the user that it is a multi-page application. When you refresh your page in the browser that single page called index.html is reloaded and you will lose the entire state of the application.
3 0
3 years ago
A new object of type list is created for each recursive invocation of f.A. TrueB. False
sammy [17]

Answer:

True but double check!

7 0
3 years ago
A circuit contains three resistors connected in parallel. The value of R1 is 2 K , the value or R2 is 6 K , and the value of R3
mezya [45]
In a parallel connection, the voltage is same in every branch.
Now, three <span>three resistors connected in parallel.
R1 = 2k ohm
</span>R2 = 6k ohm
R3 = 10k ohm
in parallel, net resisitance  = \frac{ R_{1}R_{2}R_{3} }{R_{1}R_{2} + R_{2}R_{3} + R_{3}R_{1}}

Now, putting the values, we get, R net = 1.30 k ohm.
Ans, voltage = 100 VDC
Thus, power = \frac{ V^{2} }{R} = \frac{ 100^{2} }{1.3 k} \\ \\ where \\ k = 10^{3} 
                      = 7.69 Watt
6 0
3 years ago
Other questions:
  • Walter’s health insurance premium increased by 22 percent this year. Now he pays $488 every month for health insurance. What was
    10·1 answer
  • A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The c
    14·1 answer
  • A malware-infected networked host under the remote control of a hacker is commonly referred to as:
    10·2 answers
  • Which of the following illustrates the proper declaration of a variable and data type to hold a whole number?
    13·1 answer
  • Difference between volatile and non volatile memory
    14·2 answers
  • It is important to name your files in a variety of formats. true or false
    15·2 answers
  • select all examples of proper keyboarding technique. rest your fingers gently on the home row or home keys. slouch in your chair
    9·2 answers
  • Complete the sentence.
    14·1 answer
  • Consider the conditions and intentions behind the creation of the internet—that it was initially created as a tool for academics
    12·1 answer
  • Question: 4/8
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!