1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natta225 [31]
2 years ago
10

Please don't guess answer for points!!

Computers and Technology
2 answers:
Irina-Kira [14]2 years ago
6 0

Answer:

The answer is weak, Have a nice day! :)

Explanation:

D) weak

Lerok [7]2 years ago
6 0
The answer is weak because the duration is so long that it can grow about 50%
You might be interested in
consider the following code segment, which appears in a method in a class other than password. the code segment does not compile
Romashka [77]

The code segment does not compile because the method 'reset' does not return a value that can be displayed.

A method refers to a block of that which only runs when it is called. It is permissible to pass data, referred to as parameters, into a method. Methods are used to accomplish certain actions, and they are also called functions. As per the given code segment that appears as a method in a class, it does not compile because the method named 'reset' is not returning a value that can be printed on the screen as an output.

"

<em>Complete question:</em>

Consider the following code segment, which appears in a method in a class other than password.

Password p = new Password("password");

System.out.println("The new password is " + p.reset("password"));

The code segment does not compile because _____________ .

"

You can learn more about Method at

brainly.com/question/27415982

#SPJ4

4 0
1 year ago
The two key elements of any computer system are the ________ and the ________.
mezya [45]
The second the hardware and the software
5 0
3 years ago
Identify the programmer’s responsibility in maximizing the programs reliability by having awareness of the beneficial and harmfu
trapecia [35]

Programmers can maximize the reliability of their programs by means of functional analysis.

The form in which programmers can <em>maximize</em> the reliability of their programs in accordance with the awareness of the beneficial and harmful impact on society, economies and cultures is how well they did processes of functional analyses, in which they investigate on market and client needs and derive <em>functional</em> and <em>non-functional</em> parameters, which define the scope and characteristics of the program.

A good functional analysis has an influence of about 80 % on success of programs on fulfilling existing needs and solving existing problems with a <em>reasonable</em> efforts.

We kindly invite to check this question on functional analysis: brainly.com/question/23731043

8 0
3 years ago
Katie is training for a marathon and wants to run a
Eva8 [605]

Answer: 115 miles a month

Explanation:

460/4

which equals

<em><u>115 miles per month</u></em>

6 0
3 years ago
So girls i need advice i got a girliend and shes like awesome nice sweet and i need advice what to say or nice things girls like
Mila [183]
Try getting to know her or ask her about stuff she enjoys doing or hobbies she likes
4 0
3 years ago
Read 2 more answers
Other questions:
  • You are logged in as a user with limited system privileges, you are the linux system administrator and you have the password to
    5·1 answer
  • What type of lights are necessary for silhouettes?
    12·2 answers
  • The function below takes one parameter: a string (date_string) containing a date in the mm/dd/year format. Complete the function
    11·1 answer
  • Given an array A of size N, and a number K. Task is to find out if it is possible to partition the array A into K contiguous sub
    9·1 answer
  • Consider relations A and B. Relation A represents the entity on the ""one side"" of a one-to-many relationship; Relation B repre
    11·1 answer
  • Which key is used to indent the first line of a paragraph to the right?
    15·2 answers
  • A bastion host allows the firewall to connect to the internal network and the perimeter network.TrueFalse
    15·1 answer
  • Write a function called no_you_pick. no_you_pick should have two parameters. The first parameter is a dictionary where the keys
    5·1 answer
  • Universal Container wants to understand all of the configuration changes that have been made over the last 6 months. Which tool
    15·1 answer
  • Suppose that you set the application-level environment setting for the current workspace to store all your data in the same geod
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!