1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Montano1993 [528]
3 years ago
10

Does anyone know how many Brainliests you need to be able to send a private message to someone??

Computers and Technology
2 answers:
White raven [17]3 years ago
8 0

Answer:

no idea sorry...

Explanation:

slamgirl [31]3 years ago
8 0

Answer

They are getting rid of that feature. I doesn't work anymore.

You might be interested in
The following method is intended to remove all values from the ArrayList a that have the same value as val; however, this method
Alona [7]

Answer:

ArrayList a contains [2, 3, 3, 3, 4, 5, 3, 2, 1]

Explanation:

Given

The removeValue method

Required

The content of ArrayList a, after the method is called

From the question, we understand that arraylist a is:

a= [2, 3, 4, 3, 3, 4, 4, 5, 4, 3, 2, 1]

val =4

The function fails when the value to be removed appear consecutively in the list.

4 appears in index 5 and 6 of the list. Only one of the 4's will be removed

So, the updated list will be: [2, 3, 3, 3, 4, 5, 3, 2, 1]

6 0
3 years ago
The reason for prioritizing your work is to get the
7nadin3 [17]

Answer:

a

Explanation:

3 0
3 years ago
While traveling in India, Sabina notes all of her daily expenses in rupees in her spreadsheet. At the end of the day, she wants
Contact [7]
Use currency conversion dialog box select rupee to us dollar
8 0
3 years ago
Where should your two index fingers be when your fingers are rest.
PSYCHO15rus [73]

Answer: B : F and J

Explanation: Allows you to type without looking at keys and makes all the keys easily accessible

5 0
3 years ago
What are the basic problem that my pc can have?
Lena [83]
A virus, malware, unplugged, used too much storage, etc.
5 0
3 years ago
Other questions:
  • ________ is the application of statistical techniques to find patterns and relationships among data for classification and predi
    14·1 answer
  • Which of the following terms describes surgery through a small incision in the abdomen?
    11·1 answer
  • Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in
    11·1 answer
  • What is information associated with a document to help describe that document called?
    12·1 answer
  • An exclusion contract A. gives a firm the right to be the exclusive provider of a good in a particular market. B. is a form of e
    13·1 answer
  • The most basic software required for an online course where writing is involved is:
    13·1 answer
  • What are cell phones used for?
    8·2 answers
  • You can use a minus sign to make a negative numberlike -2. What happens to each of the following 2++2
    8·1 answer
  • 3.29 LAB: Login name Write a program that creates a login name for a user, given the user's first name, last name, and a four-di
    10·1 answer
  • What is a trusted computing base (TCB)? Hosts on your network that support secure transmissions The operating system kernel and
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!