1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Step2247 [10]
3 years ago
6

Computer viruses and coding books

Computers and Technology
1 answer:
timofeeve [1]3 years ago
3 0
Is there a picture to go along with this? I don’t see one and an willing to help!
You might be interested in
Create a class named Employee. The class must contain member variables for the employee name and salary. It should contain gette
Lerok [7]

Answer:

Explanation:

The following code was written in Java. The code contains the Employee class which contains the two variables (name, salary), the constructor, getter and setter methods for both variables, and an overwritten toString method. It also contains a tester class with the main method inside and creates a Employee object and initializes it. Then it calls the toString method. The output can be seen in the attached image below. Due to technical difficulties I have added the code as a txt file below.

8 0
3 years ago
Name at least TWO kinds of gaming experiences that are possible with these new control devices but were not possible on original
Pie

Yes the ansewer is c bc you can look it up!


6 0
3 years ago
Which technological tool is important for storing critical files?.
Vanyuwa [196]

The technological tools that can be considered important for storing critical files are battery backup systems and drives. These devices can be used to store data and supply energy.

<h3>Battery backup systems</h3>

A home battery backup system is a device used to keep the electrical system working in the event when the electrical source goes down.

In computation, there are three major classes of batteries systems:  Lead-Acid, Nickel-Cadmium, and Lithium-Ion.

An uninterruptible power supply (UPS) can be considered as a battery backup supply capable of charging when the power is on.

Learn more about battery backup systems here:

brainly.com/question/7125266

3 0
2 years ago
when I was playing Mobile legends bang bang online Match The game logged Me out and when I was Trying To reconnect it failed and
Helen [10]

Answer:

it's most prolly a bug.The game crashes a lot tbh

5 0
3 years ago
You can add multiple worksheets to a workbook by clicking the home tab on the ribbon, pressing and holding ____, and then clicki
koban [17]
<span>You can add multiple worksheets to a workbook by clicking the home tab on the ribbon, pressing and holding shift , and then clicking the number of existing worksheet tabs that correspond with the number of sheets you want to add, clicking the insert list arrow in the cells group on the home tab, then clicking insert sheet.</span>
4 0
3 years ago
Other questions:
  • Behaving in an acceptable manner in a workplace environment is referred to as workplace etiquette.
    12·2 answers
  • Write a program that asks the user to input four numbers (one at a time). After the four numbers have been supplied, it should t
    6·1 answer
  • You've decided to use a subnet mask of 255.255.192.0 with your 172.17.0.0 network to create four separate subnets. The network I
    13·1 answer
  • On Windows computers, applications from Microsoft will not look and act the same as windows and menus from the operating system.
    8·2 answers
  • When planning your website, what is one of the key things you should consider
    12·2 answers
  • Â A number of companies and/or agencies, such as National ____ and Atmospheric Administrationâs National Weather Service, provid
    9·1 answer
  • While troubleshooting a network connection problem for a coworker, you discover the computer is querying a nonexistent DNS serve
    13·1 answer
  • Hi guys, Im making a game. I want to make a collision event, but what is the code for making the wall and the box collide. I rea
    6·1 answer
  • See the file attached!​
    11·1 answer
  • The most common technique for using an appropriate synchronization mechanism to serialize the accesses to prevent errors is to a
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!