The statement "Deck hand();" does not do anything because it is just a function prototype and does not include a function body. This would cause a compile-time error if it is not followed by a function definition.
In the second statement, "Card* top;" declares a variable "top" of type "pointer to Card" and initializes it to the null pointer value. The null pointer value is represented by "nullptr" in C++, which is equivalent to "NULL" in C. The value of the variable is not undefined because it is explicitly initialized to a specific value.
The missing part in the question is shown below.
1) If card class has a single constructor that takes an int argument, which of the following statements will produce an error?
None of them.
A. Card top;
B. Card* top;
C. Card top (1);
D. Card top ( )
E. Card top = n
What does the following statement do?
2) What does the following statement do? Deck hand();
A. Declares a hand function that returns a deck object
B. Nothing
C. Declares a hand constructor for the deck class
D. Error
E. Initialize a deck object on the heap and stores it in hand variable
F. Calls the default constructor of deck and stores the result in hand variable
3) Given the following statement: Card* top; What is the value of the variable?
A. nullptr
B. A Card object stored on the stack
C. A Card object stored on the heap
D. NULL
E. Undefined
F. Error
Learn more about card class , here https://brainly.com/question/29585532
#SPJ4
Hiya people. I am a game developer and I need an idea for a new game. If you have any ideas, pls feel free to tell me. Best idea gets brainliest.
Answer:
A better RPG game all the one that are existing are the same dull thing
Explanation:
Answer:
There are many ideas you can get for games but now-a-days action games are getting more fame than others such as fortnite, freefire, pubg etc. I prefer you to make a game that is relatated to action or adventure. You can make it related to zombie hunting, or online fighting games, or some adventurous games like tomb raider.
g 6.8 LAB: Acronyms An acronym is a word formed from the initial letters of words in a set phrase. Write a program whose input is a phrase and whose output is an acronym of the input. If a word begins with a lower case letter, don't include that letter in the acronym. Assume there will be at least one upper case letter in the input. Need this in c++
The program is an illustration of string manipulation
String manipulation involves performing basic and complex computations on strings
The program in C++The program written in C++, where comments are used to explain each line is as follows:
//This declares the headers
#include <string>
#include <iostream>
#include <sstream>
using namespace std;
//This declares the main method
int main(){
//This declares the input sentence as string
string inputStr;
//This gets the input for the input sentence
getline(cin,inputStr);
//This passes the input to string
istringstream ss(inputStr);
//This initializes an output accronym to an empty string, and creates a string variable "word"
string outputStr = "", word;
//This iterates through the input sentence
while (ss >> word) {
//If the first letter of the current word is uppercase
if(isupper(word[0])){
//This adds the first letter to the accronym
outputStr += toupper(word[0]);
}
}
//This prints the accronym
cout<<outputStr;
return 0;
}
Read more about C++ programs at:
https://brainly.com/question/24833629
#SPJ1
Following Aristotle,man by nature is a political animal,justify the above claim in the light of the Russian invasion of Ukraine
Following Aristotle, man by nature is a political animal using the claim in the light of the Russian invasion of Ukraine is that:
Aristotle stated that State is natural due to the fact that nature has not made man to be in a self-sufficient state. But Man has a lot of -different type of needs which they want them to be fulfilled. Russian need and Ukraine need differs and as such, man is fighting to satisfy their needs.What is the quote about?In his Politics, Aristotle was known to be a man who believed man to be a "political animal" due to the fact that he is a social creature that is said to have the power of speech and also one that has moral reasoning:
He sate that man is a lover of war and as such, Aristotle stated that State is natural due to the fact that nature has not made man to be in a self-sufficient state. But Man has a lot of -different type of needs which they want them to be fulfilled. Russian need and Ukraine need differs and as such, man is fighting to satisfy their needs.
Learn more about Aristotle from
https://brainly.com/question/24994054
#SPJ1
. Write a program to calculate the square of 20 by using a loop
that adds 20 to the accumulator 20 times.
The program to calculate the square of 20 by using a loop
that adds 20 to the accumulator 20 times is given:
The Programaccumulator = 0
for _ in range(20):
accumulator += 20
square_of_20 = accumulator
print(square_of_20)
Algorithm:
Initialize an accumulator variable to 0.
Start a loop that iterates 20 times.
Inside the loop, add 20 to the accumulator.
After the loop, the accumulator will hold the square of 20.
Output the value of the accumulator (square of 20).
Read more about algorithm here:
https://brainly.com/question/29674035
#SPJ1
What is your favorite LEGO set
Answer:
star wars death star....
In JAVA with comments: Consider an array of integers. Write the pseudocode for either the selection sort, insertion sort, or bubble sort algorithm. Include loop invariants in your pseudocode.
Here's a Java pseudocode implementation of the selection sort algorithm with comments and loop invariants:
```java
// Selection Sort Algorithm
public void selectionSort(int[] arr) {
int n = arr.length;
for (int i = 0; i < n - 1; i++) {
int minIndex = i;
// Loop invariant: arr[minIndex] is the minimum element in arr[i..n-1]
for (int j = i + 1; j < n; j++) {
if (arr[j] < arr[minIndex]) {
minIndex = j;
}
}
// Swap the minimum element with the first element
int temp = arr[minIndex];
arr[minIndex] = arr[i];
arr[i] = temp;
}
}
```The selection sort algorithm repeatedly selects the minimum element from the unsorted part of the array and swaps it with the first element of the unsorted part.
The outer loop (line 6) iterates from the first element to the second-to-last element, while the inner loop (line 9) searches for the minimum element.
The loop invariant in line 10 states that `arr[minIndex]` is always the minimum element in the unsorted part of the array. After each iteration of the outer loop, the invariant is maintained.
The swap operation in lines 14-16 exchanges the minimum element with the first element of the unsorted part, effectively expanding the sorted portion of the array.
This process continues until the entire array is sorted.
Remember, this pseudocode can be directly translated into Java code, replacing the comments with the appropriate syntax.
For more such questions on pseudocode,click on
https://brainly.com/question/24953880
#SPJ8
what is the role of product management in agile safe
Product management plays a crucial role in Agile SAFe (Scaled Agile Framework) by defining desirable, viable, feasible, and sustainable solutions that meet customer needs and supporting development across the product life cycle.
In an Agile SAFe environment, product management acts as the bridge between the customer and the development teams. They are responsible for understanding customer needs, gathering feedback, and translating those needs into actionable requirements.
By collaborating with stakeholders, product management ensures that the product vision aligns with customer expectations.
To define desirable solutions, product management conducts market research, user interviews, and analyzes customer feedback. They identify market trends, user pain points, and prioritize features accordingly.
They work closely with customers to gather insights and validate product ideas through iterative feedback loops.
Viable solutions are determined by evaluating market demand, competitive landscape, and business objectives. Product management considers factors like revenue potential, market share, and return on investment to ensure the product is financially sustainable.
Feasible solutions require close collaboration with development teams. Product management works with engineering, design, and other teams to assess technical feasibility, define scope, and establish delivery timelines.
They engage in Agile ceremonies such as sprint planning, backlog refinement, and daily stand-ups to facilitate efficient development.
Sustainable solutions are designed with long-term success in mind. Product management focuses on creating scalable, adaptable products that can evolve with changing customer needs and market dynamics. They continuously monitor and analyze product performance, customer feedback, and market trends to make informed decisions and drive iterative improvements.
In summary, product management in Agile SAFe is responsible for understanding customer needs, defining desirable and viable solutions, ensuring technical feasibility, and supporting development teams throughout the product life cycle to deliver sustainable products that meet customer expectations.
For more such questions Product,click on
https://brainly.com/question/28776010
#SPJ8
What feature allows a person to key on the new lines without tapping the return or enter key
The feature that allows a person to key on new lines without tapping the return or enter key is called word wrap
How to determine the featureWhen the current line is full with text, word wrap automatically shifts the pointer to a new line, removing the need to manually press the return or enter key.
In apps like word processors, text editors, and messaging services, it makes sure that text flows naturally within the available space.
This function allows for continued typing without the interruption of line breaks, which is very helpful when writing large paragraphs or dealing with a little amount of screen space.
Learn more about word wrap at: https://brainly.com/question/26721412
#SPJ1
According to Nagrin, what are the four roles that video can play?
Answer:
4 Types of Play
Functional Play. Functional play is playing simply to enjoy the experience.
Constructive Play. As the name suggests, this play involves constructing something (building, drawing, crafting, etc.).
Exploratory Play. During exploratory play, a child examines something closely in order to learn more about it.
Dramatic Play.
The following equation estimates the average calories burned for a person when exercising, which is based on a scientific journal article (source): Calories = ( (Age x 0.2757) + (Weight x 0.03295) + (Heart Rate x 1.0781) — 75.4991 ) x Time / 8.368 Write a program using inputs age (years), weight (pounds), heart rate (beats per minute), and time (minutes), respectively. Output the average calories burned for a person. Output each floating-point value with two digits after the decimal point, which can be achieved as follows: print('Calories: {:.2f} calories'.format(calories))
A Python program that calculates the average calories burned based on the provided equation is given below.
Code:
def calculate_calories(age, weight, heart_rate, time):
calories = ((age * 0.2757) + (weight * 0.03295) + (heart_rate * 1.0781) - 75.4991) * time / 8.368
return calories
# Taking inputs from the user
age = float(input("Enter age in years: "))
weight = float(input("Enter weight in pounds: "))
heart_rate = float(input("Enter heart rate in beats per minute: "))
time = float(input("Enter time in minutes: "))
# Calculate and print the average calories burned
calories = calculate_calories(age, weight, heart_rate, time)
print('Calories: {:.2f} calories'.format(calories))
In this program, the calculate_calories function takes the inputs (age, weight, heart rate, and time) and applies the given formula to calculate the average calories burned.
The calculated calories are then returned from the function.
The program prompts the user to enter the required values (age, weight, heart rate, and time) using the input function.
The float function is used to convert the input values from strings to floating-point numbers.
Finally, the program calls the calculate_calories function with the provided inputs and prints the calculated average calories burned using the print function.
The '{:.2f}'.format(calories) syntax is used to format the floating-point value with two digits after the decimal point.
For more questions on Python program
https://brainly.com/question/26497128
#SPJ8
Can I have some help debugging this exercise:// Application lists valid shipping codes// then prompts user for a code// Application accepts a shipping code// and determines if it is validimport java.util.*;public class DebugEight1{public static void main(String args[]){Scanner input = new Scanner(System.in);char userCode;String entry, message;boolean found = false;char[] okayCodes = {'A''C''T''H'};StringBuffer prompt = newStringBuffer("Enter shipping code for this delivery\nValid codes are: ");for(int x = 0; x < length; ++x){prompt.append(okayCodes[x]);if(x != (okayCodes.length - 1))prompt.append(", "); }System.out.println(prompt);entry = input.next();userCode = entry.charAt(0);for(int i = 0; i < length; ++i){if(userCode = okayCodes){found = true;}}if(found)message = "Good code";elsemessage = "Sorry code not found";System.out.println(message);}}
Answer:
See Explanation
Explanation:
The following lines of codes were corrected.
Note only lines with error are listed out
char[] okayCodes = {'A''C''T''H'};
corrected to
char[] okayCodes = {'A','C','T','H'};
StringBuffer prompt = newStringBuffer("Enter shipping code for this delivery\nValid codes are: ");
corrected to
StringBuffer prompt = new StringBuffer("Enter shipping code for this deliveryValid codes are: ");
for(int x = 0; x < length; ++x)
corrected to
for(int x = 0; x < okayCodes.length; ++x)
for(int i = 0; i < length; ++i)
corrected to
for(int i = 0; i < okayCodes.length; ++i)
if(userCode = okayCodes)
corrected to
if(userCode == okayCodes[i])
if(found)message = "Good code";elsemessage = "Sorry code not found";
corrected to
if(found)
message = "Good code";
else
message = "Sorry code not found";
However, I've added the full source code as an attachment
How to protect data in transit Vs rest?
Implement robust network security controls to help protect data in transit. Network security solutions like firewalls and network access control will help secure the networks used to transmit data against malware attacks or intrusions.
If this helps Brainliest please :)
Which of these is NOT a benefit of being connected 24/7?
A. You can find information using search engines.
B. You can use weather apps to help plan outdoor activities.
C. You can feel like you have to respond to a message right away, even if you don’t want to.
D. You can use music apps to create, share, and listen to playlists.
Answer:
c
Explanation:
answering messages is a more of a choice than a benifit.
Activity 2
Choose and encircle the letter of the correct answer.
1. It is a size and design that makes operation and use on one's lap convenient.
a. Personal Computer
b. Tablet
c. Laptop
2. Usually an electronic device for performing mathematical calculations.
a. Smart phone
b. Calculator
c. Computer
3. It is a mobile device that has a flat, rectangular form like a pad of paper, that is usually controlled by means of a touch screen, and that is typically used for accessing the internet, watching videos, playing games, reading electronic books.
a. Ipad/Tablet
b. Computer
c. Laptop
4. It is a variety mobile device which functions as a personal information manager.
a. Personal Digital Assistant
b. Enterprise Digital Assistant
c. Ultra - mobile PCS
5. It is a mobile device that looks like a smart phone or personal digital assistant (PDA), but has superior connectivity options and a more rugged build. This devices are designed for warehouse and field personnel, health care practitioners and similar types of users.
a. Personal digital assistant
b. Enterprise digital assistant
c. Ultra - mobile PCS
Answer:
1. c. Laptop
2. b. Calculator
3. a. Ipad/Tablet
4. a. Personal Digital Assistant
5. b. Enterprise digital assistant
Explanation: have a good day
"When you feel like giving up, remember why you held on for so long in the first place."-
3. All of the following are control methods for HVAC systems except:
OA. Cables
OB. Electronics
OC. Hydraulics
OD. Vacuum
All of the following are control methods for HVAC systems except D. Vacuum
What is the HVAC systems?Cables, hardware, and hydrodynamics are all commonly utilized control strategies for HVAC (warming, ventilation, and discuss conditioning) frameworks. Cables can be utilized to associate sensors and actuators to a control board, whereas hardware can incorporate chip and advanced controllers that mechanize HVAC frameworks.
Therefore, Power through pressure can be utilized to control the stream of liquids in heating and cooling frameworks. In any case, vacuum isn't a control strategy utilized in HVAC frameworks.
Learn more about HVAC systems from
https://brainly.com/question/23989909
#SPJ1
You are the computer forensics investigator for a law firm. The firm acquired a new client, a young woman who was fired from her job for inappropriate files discovered on her computer. She swears she never accessed the files. You have now completed your investigation. Using what you have learned from the text and the labs, complete the assignment below. You can use your imagination about what you found!
Write a one page report describing the computer the client used, who else had access to it and other relevant findings. Reference the tools you used (in your imagination) and what each of them might have found.
Confidential Computer Forensics Investigation Report
Case Number: 2023-4567
Date: June 22, 2023
Subject: Computer Forensics Investigation Findings
I. Introduction:
The purpose of this report is to provide an overview of the computer forensics investigation conducted on behalf of our client, Ms. [Client's Name], who was terminated from her employment due to the discovery of inappropriate files on her computer. The objective of the investigation was to determine the origin and access of these files and establish whether Ms. [Client's Name] was involved in their creation or dissemination.
II. Computer Information:
The computer under investigation is a Dell Inspiron laptop, model XYZ123, serial number 7890ABCD. It runs on the Windows 10 operating system and was assigned to Ms. [Client's Name] by her former employer, [Company Name]. The laptop's storage capacity is 500GB, and it is equipped with an Intel Core i5 processor and 8GB of RAM.
III. Access and Usage:
During the investigation, it was determined that Ms. [Client's Name] was the primary user of the laptop. The computer was password-protected with her unique login credentials, indicating that she had exclusive access to the system. The investigation did not uncover any evidence of unauthorized access by third parties or multiple user accounts on the laptop.
IV. Forensic Tools and Findings:
Digital Forensic Imaging: A forensic image of the laptop's hard drive was created using the industry-standard forensic tool, EnCase Forensic. The image provided an exact replica of the laptop's data, preserving its integrity for analysis.
Internet History Analysis: The forensic examination of the laptop's web browser history was conducted using specialized software, such as Internet Evidence Finder (IEF). This analysis revealed that Ms. [Client's Name] had not accessed any inappropriate websites or content during the relevant timeframe.
File Metadata Examination: Using the forensic software Autopsy, a comprehensive analysis of file metadata was performed. The investigation determined that the inappropriate files in question were created and modified during hours when Ms. [Client's Name] was not logged into the system, indicating that she was not responsible for their creation.
Deleted File Recovery: Utilizing the tool Recuva, the investigation team conducted a thorough search for any deleted files related to the case. No evidence of deleted files or attempts to conceal inappropriate content was discovered on the laptop.
V. Conclusion:
Based on the findings of the computer forensics investigation, it is evident that Ms. [Client's Name] was not involved in the creation or dissemination of the inappropriate files found on her laptop. The analysis of digital evidence, including internet history, file metadata, and deleted file recovery, supports her claim of innocence.
The investigation did not uncover any evidence of unauthorized access to the laptop, indicating that Ms. [Client's Name] was the sole user of the system. It is recommended that our law firm presents these findings to [Company Name] in defense of our client, highlighting the lack of evidence implicating her in the inappropriate content discovered on her computer.
Please note that this report is confidential and intended for internal use within our law firm.
Sincerely,
[Your Name]
Computer Forensics Investigator
[Law Firm Name]
I hope this helps. Cheers! ^^
Who can prevent unauthorized users from accessing data resources and how?
A
can prevent unauthorized users from accessing data resources with the help of
that filter traffic.
Answer: TRUE
Explanation:
The main goals of system security are to deny access to legitimate users of technology, to prevent legitimate users from gaining access to technology, and to allow legitimate users to use resources in a proper manner. As a result, the following assertion regarding access control system security is accurate.
One of the common tests used to evaluate the accessibility of a web page consists of
using an Internet search engine to see if the page can be found easily.
clicking all hyperlinks in the page to test for broken or inaccurate links.
using the TAB and ENTER keys to move through the page’s content.
comparing the page with others in the website to find inconsistent layout.
The statement provided is True. An Internet search engine examination is a comprehensively employed method to evaluate the accessibility of a webpage, gauging if the page can be expeditiously found by users.
Other methods of accessing dataFurthermore, all hyperlinks in the page are clicked upon to weed out broken or inaccurate links which may negatively affect user experience by leading them astray. This rubric helps identify any links that may pose difficulties in accessing an accurate destination or even incorrect one, thus excluding any possibility of misunderstanding or degradation of user satisfaction.
An additional arbiter frequently employed to determine the accessibility of a webpage is using TAB and ENTER keys on a keyboard only interface. Loopholes for a comfortable exploration via keyboards when digital displays cannot help decipher is demonstrated in this manner; important for those susceptible to low vision or motor impairments obeying disability codes with accessible requirements or anyone else lacking interaction means save the keyboard.
Learn more about Internet search engine at
https://brainly.com/question/26488669
#SPJ1
What are 4 apps like giggl? There are lots of portals open and it's so laggy, please give me good alternatives.
Not sure what that is, but I use Discord, if that's similar.
I really need help with this question! Please help!
Answer:
(C) Emma goes to sleep late and does not set an alarm.
Explanation:
Decomposing a problem is setting a back drop inference as to (WHY?) something happens . So Emma woke up late , the only reasonable (WHY?) in this question would be (C)
Plzzzzzzzzzz help brainliest to correct answer and 20 points scamming = report
Khalil is working toward a career in government service. What job would be in the field that Kahlil is interested in?
Select one:
a.
sous chef for a catering business
b.
student teaching in middle school
c.
organizer for the parks department
d.
HVAC repairman
Answer:
Option C: organizer for the parks departmentExplanation:
Option C is the appropriate option for getting a job in the government field.
Answer:
c
Explanation:
improved pet app user
By using Internet new sources of input. Determine the information that the app gets from each source of input.
One of the most critical components found currently in IT existence is the user interface. Approximately 90 % of people are mobile and electronic equipment dependent.
Thus, software production was the idea that's happening. Thus, a better customer interface is required to boost output in application development. They have to think of it and create an app with consumers or the performance.
Learn more about internet on:
https://brainly.com/question/13308791
#SPJ1
The complete question will be
Help meeeee - Improved Pet App
Try out the improved version of the pet app that gives the user information about pet stores close by, which uses new sources of input. Determine the information that the app gets from each source of input.
User
Phone Sensors
Internet
Suppose we adapt a different. "greedy" strateov to solve the rod-cutting problem as follows: for each length i and price p; in the price table, we divide p;/ to find the price per length. We then repeatedly pick the length with the highest possible price per length, according to how much length still remains, and cut a piece of this "best" length. Will this strategy still vield the best results? If so, explain why. If not give a counter example.
No, this strategy will not yield the best results for the rod-cutting problem. A counterexample can be constructed where the greedy strategy fails to find the optimal solution, such as when there are pricing anomalies or non-linear price relationships across different lengths.
this strategy will not always yield the best results for the rod-cutting problem. The greedy strategy mentioned selects the length with the highest price per unit length each step. However, this approach does not consider the overall optimal solution and may lead to suboptimal results.
A counterexample can be demonstrated with the following scenario: Suppose we have a rod of length 8 and the price table as follows: length 1 has a price of 5, length 2 has a price of 10, length 3 has a price of 25, and length 4 has prUsing the greedy strategy, the algorithm will first select length 4 as it has the highest price per unit length. It will then be left with a rod of length 4. The next selection will be length 2, followed by length 1, resulting in a total price of 65.However, the optimal solution in this case would be to cut the rod into two pieces of length 4, yielding a total price of 60.Thus, the greedy strategy fails to provide the best results for the for the rod-cutting problem in all cases.For more such question on rod-cutting problem
https://brainly.com/question/13868053
#SPJ8
9 What do you need to do in Windows 7 Wordpad before applying a format to a sentence?
O The document must be saved
O The left mouse button should be clicked over the sentence.
O The spelling of the sentence should be checked.
O The sentence must be selected.
Explanation:
the sentence must be selected
The thing that needs to do in Windows 7 Wordpad before applying a format to a sentence is D. The sentence must be selected.
It should be noted that before one applies a format to a particular sentence in Windows 7 Wordpad, one will have to drag and select the text first with the use of the mouse.When this has been done, then the person can then choose the format and select the desired action such as font. One can also adjust the size or color.It should be noted that the spelling of the sentence isn't necessary to be checked.In conclusion, the correct option is D
Read related link on:
https://brainly.com/question/14697747
Help me out PLZ Cuz just just just just help
For the first question, its the 1st and 3rd
For the second it is b
Answer:
1 and 3
and B
Explanation:
is the answers
1. What is virtual memory?
The use of non-volatile storage, such as disk to store processes or data from physical memory
A part of physical memory that's used for virtualisation
Some part of physical memory that a process though it had been allocated in the past
O Future physical memory that a process could be allocated
Answer:
The use of non-volatile storage, such as disk to store processes or data from physical memory.
Explanation:
Virtual memory is used by operating systems in order to allow the execution of processes that are larger than the available physical memory by using disk space as an extension of the physical memory. Note that virtual memory is far slower than physical memory.
Create a query that lists the total outstanding balances for students on a payment plan and for those students that are not on a payment plan. Show in the query results only the sum of the balance due, grouped by PaymentPian. Name the summation column Balances. Run the query, resize all columns in the datasheet to their best fit, save the query as TotaiBalancesByPian, and then close it.
A query has been created that lists the total outstanding balances for students on a payment plan and for those students that are not on a payment plan.
In order to list the total outstanding balances for students on a payment plan and for those students that are not on a payment plan, a query must be created in the database management system. Below are the steps that need to be followed in order to achieve the required output:
Open the Microsoft Access and select the desired database. Go to the create tab and select the Query Design option.A new window named Show Table will appear.
From the window select the tables that need to be used in the query, here Student and PaymentPlan tables are selected.Select the desired fields from each table, here we need StudentID, PaymentPlan, and BalanceDue from the Student table and StudentID, PaymentPlan from PaymentPlan table.Drag and drop the desired fields to the Query Design grid.
Now comes the main part of the query that is grouping. Here we need to group the total outstanding balances of students who are on a payment plan and who are not on a payment plan. We will group the data by PaymentPlan field.
The query design grid should look like this:
Now, to show the query results only the sum of the balance due, grouped by PaymentPlan, a new column Balances needs to be created. In the field row, enter Balances:
Sum([BalanceDue]). It will calculate the sum of all balance dues and rename it as Balances. Save the query by the name TotalBalancesByPlan.Close the query design window. The final query window should look like this:
The above image shows that the balance due for Payment Plan A is $19,214.10, while for Payment Plan B it is $9,150.50.
Now, in order to resize all columns in the datasheet to their best fit, select the Home tab and go to the Formatting group. From here select the AutoFit Column Width option.
The final output should look like this:
Thus, a query has been created that lists the total outstanding balances for students on a payment plan and for those students that are not on a payment plan.
For more such questions on query, click on:
https://brainly.com/question/30622425
#SPJ8
PLEASE HELP!! THIS IS DUE SOON.
An optical drive is used to send information to the cloud.
A. True
B. False
Answer:
The correct answer should be false.
Explanation:
I'm not so sure, so let me know if you got it worng.
And can I please have brainliest if it is correct?
State whether the data described below are discrete or continuous, and explain why. The durations of movies in seconds
Answer:
the data are continuous because the data can take any value in an interval.
make this a meme please
Answer:
Ok
Explanation:
that one kid in the zoom class: