Answer:
Answer below.
Explanation:
You are creating an object of bird "b" with a talon strength of 5 and a beak of 5.
public Hawk(int talon, int beak)
{
super(beak);
talonStrength = talon;
}
Please mark brainliest if this is the answer you were looking for
Please mark brainliest if this is the answer you were looking for
In this exercise we have to use the knowledge of computational language in python to write the code.
We have the code in the attached image.
The code in python can be found as:
public Hawk(int talon, int beak)
{
super(beak);
talonStrength = talon;
}
See more about python at brainly.com/question/26104476
the field names in a database are also known as__?
Answer:Here are some common database field types, which are called different names in accordance with the specific database design:
Text, Alphanumeric, Character, String
Byte
Short, Integer
Long, Integer
Single, Real
maybe more
Explanation:
Answer:
Column
Explanation:
I..d...k I’m not 100% sure
!!!!! 40 pts !!!!!
Select the correct answer from each drop-down menu.
Which words or statements complete the sentences given below?
Interference created by fatigue is called ___
noise. Interference created by strong negative emotions is called ____ noise.
Physiological noise
semantic noise
What is the purpose of the 300 Log?
Answer:
The OSHA Form 300 is a form for employers to record all reportable injuries and illnesses that occur in the workplace, where and when they occur, the nature of the case, the name and job title of the employee injured or made sick, and the number of days away from work or on restricted or light duty, if any.
Explanation: brainliest plzzzz!
Which field can be used to track the progress on tasks that a user has created? A. A. Subject
B. Start Date
C. Due Date
D. % Complete
What is piracy? (1 point)
A.the use of copyright in federal court
B.copying, downloading, reproducing, or distributing materials without permission
C.exercising your intellectual property rights
D.giving others permission to use your tangible property
Answer:
B
Explanation:
what is a sending device
Answer:
A sending device that initiates an instruction to transmit data, instruction, or. information. e.g., Computer A, which sends out signals to another computer. □ A communication device that converts the data, instructions, or information. from the sending device into signals that can be carried by a.
Answer:
A sending device is an object that gives instructions to transmit information.
Fill in the blanks
1. A group of computers connected with each other, make a ____________ .
2. A computer or a device connected to a network is called __________ .
Answer:
1.Local Area Network
2.network host
Use the factorial operation to evaluate 4!.
10
O 24
04
0 1
Answer:
24
Explanation:
factorial operation 4! = 4×3×2×1 = 24
Which gallery will allow a user to access a variety of preconfigured formatting styles for images that are added to a
PowerPoint presentation?
O WordArt gallery
O Shape Styles gallery
O Picture Styles gallery
O SmartArt gallery
Answer:Picture Styles gallery
Explanation:
Why do companies implement new technology?Select all that apply.
1. to help their company work more efficiently and more effectively
2. to keep up with their competitors
3. to have the latest greatest technology out there
4. to grow their profits
5. to generate a lot of new work for their employees
The list blocks that allow for storing and accessing a list of numbers and strings is called.
String manipulation
Arrays
Variable
Random
Hey so the answer to this is a variable because variables can store text and numeral values when an array can only store numbers
hope this helps
have a great day
-scav aka Toby
Answer:Array is the right option because array accessing the list of variables and integers like 1,2,4..etc variables just hold the data.
how will you format date so that dates appear in a format similar to 26-January-2022
Answer:
26/01/2022or01/22/2022
Which of the following is an example of an application ?
Write an algorithm and corresponding flowchart for a program that prints multiple of 5 starting with 100 and ending with 180.
Answer:
The pseudocode is as follows:
1. Start
2. total = 0
3. for i = 100 to 180 step 5
3.1 total = total + i
4. print total
5. Stop
Explanation:
This begins the algorithm
1. Start
This initializes the total to 0
2. total = 0
This iterates from 100 to 180 with an increment of 5
3. for i = 100 to 180 step 5
This adds up all multiples of 5 within the above range
3.1 total = total + i
This prints the calculates total
4. print total
This ends the algorithm
5. Stop
See attachment for flowchart
Select the correct answer.
Kristine has been getting many unsolicited emails from a particular address. She thinks that these emails may harm her computer. What action
should she take to automatically send such emails to a separate folder?
ОА.
send all such emails to the Trash folder
ОВ. group the emails and put them into a folder
OC. Send all such emails to the Spam folder
OD
delete these emails manually on a daily basis
C. Send all such emails to the Spam folder
What is IPO? Write down the steps involved in IPO cycle.
An initial public offering or stock market launch is a public offering in which shares of a company are sold to institutional investors and usually also retail investors. An IPO is underwritten by one or more investment banks, who also arrange for the shares to be listed on one or more stock exchanges
Answer:
An IPO is an offer of shares by a company in exchange for capital. The entire process is regulated by SEBI - the Securities & Exchange Board of India. To buy shares of any company in an IPO, you have to bid for these shares. If your bid is accepted, you are allotted shares.
Explanation: brainliest plz!
What does the narrator mean when she says Adnan and his friends were........
Answer:
he/she means that Adanan and his friend all were doing the ....
Classroom content transaction
examples use of IT
Answer:
1. Online classes
2. Presentation
3. Account of books
__________________ is a technique can be beneficial when driving next to parked vehicles or approaching signal lights or intersections.
Covering the brake
Using your handbrake
Slipping the clutch
Drifting
Answer:
Covering the brakeis a technique can be beneficial when driving next to parked vehicles or approaching signal lights or intersections
Covering the brakes is a beneficial driving technique for driving next to parked vehicles o while approaching the signal lights.
What is driving technique?The appropriate and standard ways keeping the legal functions in mind while driving a vehicle is known as an ethical driving technique.
While driving, when a parked vehicle is in the way or at the time of approaching the signals or intersections on the roads, it is the best advisable to cover the brakes of the vehicles.
Hence, option A holds true regarding the driving technique.
Learn more about driving technique here:
https://brainly.com/question/9854106
#SPJ2
Fill in the blank: In a Word chart, text that describes the data represented in a chart and that is typically displayed on the right or at the bottom of the chart is called the ____.
Answer:
Data bar
Explanation:
In a Word chart, text that describes the data represented in a chart and that is typically displayed on the right or at the bottom of the chart is called the data bar.
What is a data bar?Data bars are used to describe a graphic element that inserts bars representing the values within cells. It is a type of conditional formatting that creates a visual effect in the cells of your database that correspond to the contents of the cell. A larger value represents a cell with a longer bar while a smaller value represents cell with a shorter bar.
Read more on data bar:
https://brainly.com/question/9700709
#SPJ2
arrange the following devices pendrive , hard disk , compact disc in descending order of storage capacity
Answer:hard disk compact disc
Explanation:
write a program that asks length,breadth and height of a room and calculate its volume
Answer:
cls
Input"enter length";l
Input"enter breadth";b
Input"enter height";h
v=l*b*h
print"the volume is";v
end
Explanation:
hope you got it
Keli is unable to find a shape that meets her needs. Which feature in Power Point should she use to create shapes that are completely customized?
Answer:
I just use the search bar in the app and type in shapes. Then you right click on the shape and click on edit points to shape it into whatever shape you want.
Explanation:
I went into the PowerPoint and did it myself.
I'm kinda lazy if anyone agrees with me. I couldn't write the question but I took a pic.
Answer:
eat the stick
Explanation:
because its long and juicy
I need this nowww!!!!
Answer:
b,c
Explanation:
Which of these is NOT a component of a packet? Choose the answer.
Header
protocol
body (payload)
trailer(footer)
Answer:it is protocol i just took a test with the same question and i got protocol right
Explanation:
One problem with _______ is that often many copies of the same document are made.
HELPPP
Answer:
computer or internet is that often many copies of the same document .........
What types of information should have their sources cited to avoid plagiarism? List at least 3
Answer:
Everything.It doesn't matter the information because there's always a way to plagiarize.No matter what the information, always, ALWAYS, cite the source.
Explanation:
Answer:To avoid plagiarism, cite your sources for statistics, opinions, quotes, and judgments.
Explanation:
Which of these is NOT an example of intellectual property? O a song you wrote O an article you published O hardware you purchased O a sculpture you created Question 5 9
Answer:
hardware you purchased
Explanation:
Copyright law can be defined as a set of formal rules granted by a government to protect an intellectual property by giving the owner an exclusive right to use while preventing any unauthorized access, use or duplication by others.
Patent can be defined as the exclusive or sole right granted to an inventor by a sovereign authority such as a government, which enables him or her to manufacture, use, or sell an invention for a specific period of time.
Generally, patents are used on innovation for products that are manufactured through the application of various technologies.
Basically, the three (3) main ways to protect an intellectual property is to employ the use of
I. Trademarks.
II. Patents.
III. Copyright.
An intellectual property can be defined as an intangible and innovative creation of the mind that solely depends on human intellect. They include intellectual and artistic creations such as name, symbol, literary work, songs, graphic design, computer codes, inventions, etc.
Hence, a hardware you purchased is not an example of an intellectual property.
Why do guys get jealous when u hangout with another guy that's not them
Anyways what's 1+1 just putting this to not get reported by a mod
Answer:
pootin
Explanation:
yotub search terms:
putin behind putin assassination