1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lorico [155]
3 years ago
15

Create a logic array qualifyingIndex with true for any location where the runner is male with a running time less than 8.2. Row

array runnerGenders indicate if a runner if male (M) or female (
f. Row array runnerTimes indicates the corresponding runner's time.
Computers and Technology
1 answer:
larisa [96]3 years ago
5 0

Rounding Numbers

Say you wanted to round the number 838.274. Depending on which place value you'll round to, the final result will vary. Rounding 838.274:

Rounding to the nearest hundred is 800

Rounding to the nearest ten is 840

Rounding to the nearest one is 838

Rounding to the nearest tenth is 838.3

Rounding to the nearest hundredth is 838.27

You might be interested in
which two partitions do you typically create at minimum during a fedora linux installation? (choose two answers.)
algol [13]

/ and swap

When you install Fedora Linux, the "/" and "swap" partitions are created by default. However, you can create additional partitions if you want. Here's a look at the minimum partitions you need for a Fedora Linux installation.

The "/" partition is the root partition. This is where the operating system is installed. The minimum size for this partition is 1 GB.

The "swap" partition is used for virtual memory. The minimum size for this partition is 2 GB.

You can create additional partitions for storage, but these are the minimum partitions you need for a Fedora Linux installation.

Learn more here:

brainly.com/question/13487450

#SPJ4

5 0
1 year ago
How to get someone off your best friends list without blocking them
Paraphin [41]

Answer:

Which website

Explanation:

6 0
2 years ago
"In a web app, where is data usually stored? A. Mobile network B. Application storage C. Local computer D. Cloud storage"
ollegr [7]

Answer:

The answer is "Option C".

Explanation:

The local computer also refers to locally, it is a device, that is used by LAN. It is also called as a remote computer, in which all the data is stored in the main computer and accessible by protected password, and certain choices were wrong, which can be described as follows:

  • In option A, It is used in digital communication.
  • In option B, It is used in androids.
  • In option D, It is used to provides web services.
6 0
3 years ago
What chage command should you use to set the password for jsmith to expire after 60 days and give a warning 10 days before it ex
nata0808 [166]

chage -M 60 -W 10 jsmith Forces jsmith to keep the password 60 days before changing it and gives a warning 10 days before changing it.

<h3>Which command should you use to set the expiration date for a user account?</h3>

The “chage” command is used to modify the password expiry date of the user's account in which you can change the current status of the expiry date, set expiry date to lock the account, active and passive status, and warning days before the account get expired.

<h3>What is chage command Linux?</h3>

The chage command is self-described as the "change user password expiry information" utility. According to the chage man page: The chage command changes the number of days between password changes and the date of the last password change.

To learn more about chage command, refer

brainly.com/question/13084023

#SPJ4

7 0
1 year ago
Who was the creator of the game Fnaf?
Lisa [10]
"Scott Cawthon" did that.........
8 0
3 years ago
Read 2 more answers
Other questions:
  • explain the key reasons why entity relationship modeling is important, and determine at least (1) way in which it impacts the ov
    5·1 answer
  • If you delete an imessage does the other person see it
    12·1 answer
  • What is used to monitor the activity of a network and notify network administrators when it identifies something as suspicious?
    15·1 answer
  • HELP 11 pointsw to the person who helps me
    11·2 answers
  • Is anyone really good at immerse 2 learn??
    9·1 answer
  • Two of the major sources used today for obtaining information to create computer maps are satellites and _____________.
    11·2 answers
  • PLS HELP ILL GIVE BRAINLY) enter the answer) desktop publishing software enables users to create products for print or _________
    12·1 answer
  • Does the security burden fall primarily on the user? On
    10·1 answer
  • Working with text in presentation programs is very ____ using text in other applications.
    10·1 answer
  • What is the function of a primary key in a table? to uniquely identify each record in the table to uniquely identify foreign key
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!