shang chi Critique (6-8 sentences)

Answers

Answer 1

Explanation:

.......................


Related Questions

In Java, a reference variable is ________ because it can reference objects of types different from its own, as long as those types are related to its type through inheritance.

Answers

Answer:

polymorphic

Explanation:

An example of polymorphic reference, suppose you have 3 classes: Main, Product and SpecificProduct. If SpecificProduct extends Product this means it is a product class but with something else to complement.

Say you want to reference an object of product in the main class, you can do it the classic way:

Product pd = new Product();

Or you can do it polymorphic, like this:

Product pd = new SpecificProduct();

The program will accept just fine because SpecificProduct is extending Product. When you do it like this, we say the reference you made was a polymorphic reference

a steep reduction is memory available on the heap to the poiont where it is completly exhausted is known as a

Answers

Based on the information that is given, a steep reduction in the memory that's available is known as a memory leak.

A memory leak simply means a form of resource leak which occurs when a computer program manages memory allocations incorrectly in such a way that the memory that isn't needed anymore aren't released.

It should be noted that a memory leak is also a steady reduction in memory available on the heap to the point where it's exhausted. It can also be when an object that is stored in memory can't be accessed by the running code.

Read related link on:

https://brainly.com/question/25820385

what is a common indicator of a phishing attempt cyber awareness 2022

Answers

There are several types of malicious document. A common indicator of a phishing attempt cyber awareness 2022 is that It includes a threat of dire circumstances.

Phishing attacks often makes use of email or malicious websites to infect the machine with malware and viruses so as to collect personal and financial information.

Cybercriminals often uses different means to lure users to click on a link or open an attachment that infects their computers thereby producing vulnerabilities for criminals to use to attack.

Learn more from

https://brainly.com/question/24069038

from which Menu option you can change page setup in MS Word​

Answers

page layout tab or the page setup dialog box

Until 2016, the popular song _____ was covered by copyright law, unusually long after it was written in 1893.

A.
Happy Birthday

B.
Merry Christmas, Everyone

C.
Hava Nagila

D.
Auld Lang Syne

Answers

Answer: Happy Birthday

Explanation:

Answer is A. Happy Birthday

How to turn robot voice like real human voice.

Answers

Go in front of the mirror and act like robot and talk ,there you have a robot voice like real human voice

it is possible to be logged into a wi-fi network that does not have internet access.

Answers

Answer:

yes it is possible. it'll take some work tho

Explanation:

you would have to bypass the security and disable the proxy and go through the firewall and do some other things to access it

When a mobile user connects to a main office using a standard Internet connection, a ____ provides the mobile user with a secure connection to the company network server.

Answers

A virtual private network (VPN) is an encrypted connection using a standard Internet connection to connect a device to a network.

A virtual private network (VPN) is used to connect a private network to a public network. It enables users have access to the private network thereby enabling them to send and receive data across public networks.

A virtual private network (VPN) is an encrypted connection using a standard Internet connection to connect a device to a network.

Find out more at: https://brainly.com/question/25234505

the pathway through which an electric signal moved between devices is known as what?

Answers

The answer would be electric Circuit or just circuit!

Which is a function of an operating system?.

Answers

Answer:

An operating system is known as the interface between the computer hardware and the user itself. It is one of the most essential parts of a computer, and is the most integral software. It's responsible for executing programs, handling other inputs i.e an additional mouse, keyboard, etc. as well as handling storage for data and other files. In addition to this, it manages the computer's resources as well as executes and enables services.

Consider the following code segment, which is intended to store the sum of all multiples of 10 between 10 and 100, inclusive (10 20 ... 100), in the variable total.
int x = 100;int total = 0;while( /* missing code */ ){total = total + x;x = x - 10;}Which of the following can be used as a replacement for /* missing code */ so that the code segment works as intended?A. x < 100.B. x <= 100.C. x > 10.D. x >= 10.E. x != 10.

Answers

The code segment illustrates the use of while loops

Loops are program statements that are used for repetitive and iterative operations

The missing statement in the code is x>= 0

The code is meant to add numbers from 10 to 100 (inclusive) with an increment of 10.

At the beginning of the program, variable x is initialized to 100, and it is reduced by 10 in the iteration until it gets to 10

So, the condition must be set to stop when the value of x is 10 i.e. x >= 0

i.e. the iteration must be repeated while x is greater than or equal to 10

Hence, the missing statement is (d) x >= 0

Read more about loops at:  

brainly.com/question/16397886

When resizing images or objects in a presentation, why should a user not utilize the sizing handles in the middle of the sides or bottom of an image?

B will resize but not maint aspect ratio was correct

Answers

Answer:

b. It will resize the image but not maintain aspect ratio

Explanation: is correct. post protected

Answer:

b

Explanation:

In high-tech fields, industry standards rarely change.
True
False

Answers

Answer: false

Explanation:

Four types of firewalls are: Packet filtering, stateful inspection, circuit level proxy and _________ .

Answers

Answer:

oxigen

Explanation:

Tamara is writing a program to organize students in a class and needs to use operators to organize student grades, then compare the results of that to each other. What kinds of operators does Tamara need to use for each step?
Tamara needs to use
operators to organize the students' grades, then
operators to compare the results.

Answers

Answer:   you said "Tamara needs to use

operators to organize the students' grades, then

operators to compare the results."

i think your right

Explanation:

sounds right.

we are unable to process your request at this time. if you continue to receive this error, please contact cardholder services by calling the number on the back of your card.

Answers

Answer:

is this a sim chip card replacement card for Electronics ?

Explanation:

________________ is access to the internet through your tv connection.

Answers

Answer:

Cable Modem

Explanation:

PLEASE HELP ME FASTTTTTT Input statements allow the user to enter data that a program uses to perform necessary computations. Users enter the data when they the program.

Answers

Answer:

The scanf() is the function that is used to take inputs from the user with the help of the standard input device,i.e, the keyboard.

scanf() function is capable of taking any data type as an input, though it has to be specified first like %d for integers, %s for strings and %f for floating-point type. The gets() function can only take a string as an input.

Explanation:

Answer:

ur

Explanation:

ur mom

1. Which software is used mostly for typing text? a) Word b) Excel O c) PowerPoint o d) Paint​

Answers

Answer:

a. Word

Explanation:

Microsoft Word is the most widely used word processing software according to a user tracking system built into the software.

Answer: a) Word

Explanation: Microsoft Word is the most widely used word processing software.

Which tools exist on the 3-D Map Layer pane? Check all that apply. filter options layer options time visualization category visualization Udata layer visualization data value visualization​

Answers

Answer:

filter options

layer options

category visualization

data value visualization

Explanation:

The CNSS model of information security evolved from a concept developed by the computer security industry known as the ____________________ triad.

Answers

The CNSS model of information security evolved from a concept developed by the computer security industry known as the CIA triad .

what programming language supports relational databases?

Answers

A programming language that supports relational databases is SQL (Structured Query Language)

Structured Query Language (SQL), is the principal method for communicating with Relational Databases.

A relational database is a group of data elements that are linked together by predefined connections. These elements are laid up in the form of a series of tables containing columns and rows.

Tables are utilized for storing data about the items that will be displayed in the database. A column in a database contains a specific type of data, whereas a field records the actual value of an attribute. The table's rows indicate a collection of linked values for a single item or entity.

Each entry in a database can be assigned a unique identity known as a primary key, and rows from other tables can be linked together via foreign keys. This data may be accessible in a variety of ways without having to reorganize the database tables itself.

Learn more about Relational Databases here:

https://brainly.com/question/8457395?referrer=searchResults

What is the largest integer that can be represented with 4 bits?.

Answers

Answer:

15

Explanation:

You can calculate the maximum number using a simple formula:

2^N (Where N is the number of bits) - 1

So 2^4 - 1 = 16 - 1 = 15

text to appear
Name the highlighted part as a whole. What are the segments- bgcolor and “SKYBLUE” called?
What is the output going to be due to the highlighted part?

Answers

Answer:

bg color stands for background color while SKYBLUE is the color assigned to it.

Explanation:

It is setting the background color of the body tag to sky blue.

a ________ uses electronic memory and has no motors or moving parts.

Answers

Answer:

a to uses electronic memory and has no motors or moving parts.

Explanation:

brainliest me and follow ty

1.Write a C++ program that allows the user to enter the phrase "I am smart". Output the first letter and last letter of the phrase using string properties.

2.Write a C++ program to output the following values after they are loaded into an array: 67, 45, 12, 89, 46, 88 and 43.
PLS Help they are different questions

Answers

Answer:

1)

string value;

cout << "type I am smart";

cin >> value; // get user input from the keyboard

2)

int num1 = 67;

int num2 = 45;

int num3 = 12;

int num4 = 89;

int num5 = 46;

int num6 = 89;

int num7 = 46;

int num8 = 88;

int num9 = 43;

int numbers [ ] = {num1,num2,num3,num4,num5,num7,num8,num9} ;

//to load it as a function

int main ()

{

for ( n=0 ; n<5 ; n++ )

{

result += numbers[n];

}

cout << result;

return 0;

}

The C++ programs are illustrations of arrays and strings

The program 1

The program written in C++ is as follows:

#include<iostream>

using namespace std;

int main(){

   //This declares the string

   string myStr;

   //This gets the input

   cin>>myStr;

   //This prints the first and the last index elements

   cout<<myStr[0]<<" "<<myStr[myStr.length()-1];

   return 0;

}

The program 2

The program written in C++ is as follows:

#include<iostream>

using namespace std;

int main(){

   //This initializes the array

   int myArr [] = {67, 45, 12, 89, 46, 88, 43};

   //This prints the array elements

   for(int i = 0; i<7;i++){

       cout<<myArr[i]<<" ";

   }

   return 0;

}

Read more about arrays and strings at:

https://brainly.com/question/15683939

#SPJ2

All variables are----------------------------------------------- help please

Answers

Answer:

variables are any characteristics that can take on different values, such as height, age, species I think

Answer

A variable basically works as a "placeholder" for anything that might change a majority of the time.

Examples

In science one may call a factor in a experiment that is subject to change a variable.

In math the term is used for a symbol that we do not know yet, such as x or y. Typically in math a variable is a letter.

In computer programming, variables are used to store information to be referenced and used by a computer program. They do give a way of naming data with a descriptive name as well so programs can be understood more clearly. When you go to assign values to the "variable" you are basically assigning individual variables such as the ones above in a way.

In older languages, you could leave a selection or loop before it was complete by using a ____ statement

Answers

Answer:

D) go to

Explanation:

A) next

B) go next

C) loop

D) go to

D) go to is correct answer

(Hope this helps can I pls have brainlist (crown)☺️)

write an expression taht evaluated to true if and only if the variable s does not contain the string 'end'

Answers

Answer:

//check which string is greater

if(strcmp(name1,name2)>0)

//assign name1 to first, if the

    //name1 is greater than name2

    first=name1;

else

    //assign name2 to first, if the

    //name2 is greater than name1

    first=name2;

5)

//compare name1 and name2

    if(strcmp(name1,name2)>0)

   

         //compare name1 and name3

         if(strcmp(name1,name3)>0)

       

             //assign name1 to max, becuase

             //name1 is greater than name2 and name3

             max=name1;

       

Explanation:

ok so I have two accounts and like, the other account has -20 points??? what happened​

Answers

You need to do the questions to get more points
Other Questions
a speaker who delivers a speech of introduction should avoid Guys I need help please! Do not scam me ok? Thanks:). Please take a screenshot and send thanks. What does Ender decide he must do about bullies? Why? (ENDERS GAME ) please no links i just need help geometry help please?! The graphs below have the same shape. What is the equation of the bluegraph?A) g(x) = (x-4)^2B) g(x) = (x+4)^2C) g(x) = x^2 + 4D) g(x) = x^2 - 4 Janice bought 4 oranges for $3.40. what is the unit price. The t statistic for a test ofH0:=20HA: Lewis is responsible for all installation activities at a large utility company. He would be considered a _______ manager. which enzyme catalyzes the elongation of a dna strand Find c[tex]a+a=10\\a+b=35\\b-z=5\\z+a+b+c= 10[/tex] 26. predict the elect of the loss of forests on cellular respiration in other organisms 4/2 - (-2/3)im confusedddd lol PART A: Which of the following statements best summarizes a theme of the text? The story of david and goliath ABe kind to your enemies and you will triumph.BNever underestimate your opponents.CBrute strength cannot defeat faith and courage.DSlingshots are actually effectively weapons. what is 5 x 1284plz answer thanks Find the equation of this line. MATHWhich equation would you use to solve the following situation? If everybody on the team scores 4 points, and the team has a total of 28 points, how many people are on the team? 7 p = 28 4 p = 28 28 - p = 4 4 + p = 28 g What are the dimensions that will maximize the area of the window if you have 20 ft total for the perimeter of the window I need an email example to send to my professor about asking about my grades and meet up and discuss about it, it needs to be professional how does jem break the remaining code of childhood