1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mel-nik [20]
2 years ago
15

if you want to clear a single file, what move instruction would you use? group of answer choices none of the choices file to wor

d move. file to file move. word to file move.
Computers and Technology
1 answer:
Free_Kalibri [48]2 years ago
3 0

If you want to clear a single file, you will use clear (CLR) instruction. Thus, for this question option A '<em>none of the choices</em>' is the correct answer.

The 'clear' instruction is used to clear the value within the file or word to zero. When the input of clear instruction is true, the value within the destination file will be set to zero.

<u><em>However, the function of each </em></u><u><em>move </em></u><u><em>instruction is briefly described below:</em></u>

  • file-to-word move: A file-to-word move instruction transfers data from a file into a word.
  • file-to-file move: A file-to-file move instruction allows for data to move from one file to another file.
  • word-to-file move: A word-to-file move instruction enables the transferring of information from the word to go to the last unused word of the file.

You can leran more about Move at

brainly.com/question/15134002

#SPJ4

You might be interested in
What does a pencil icon in the row selector area indicate?
Veronika [31]

Answer:

c

Explanation:

8 0
3 years ago
The automated key distribution approach provides the flexibility and dynamic characteristics needed to allow a number of users t
docker41 [41]

Answer:

The correct answer is option A. "True".

Explanation:

Key management could either be manual or automated. The automated key distribution approach is more flexible and dynamic than the manual key distribution approach, because it is better at responding to changing requirements in the system. Additionally, the automated key distribution approach is faster and more economic as well as observable and auditable.

6 0
3 years ago
You would like to help guide your company in choosing between valuing privacy and increasing the company's bottom line. What is
Ainat [17]

In the above case, the option that will help to guide your company in choosing between valuing privacy is a set of internal principles.

<h3>What are internal control principles?</h3>

The principles of internal control are known to be  needed in the management to set methods in place to make sure that company assets are kept.

Therefore, In the above case, the option that will help to guide your company in choosing between valuing privacy is a set of internal principles.

Learn more about internal principles from

brainly.com/question/27015769

#SPJ1

6 0
2 years ago
What subsection of the Internet requires specialized browser to access and is frequently used by cyber criminals and underground
kotykmax [81]

Answer:

c. Dark Web                                                

Explanation:

Surface web is also called visible web is a part of world wide web that can be easily searchable using search engines as its contents are indexed by the search engines such as Google and its contents are accessible by public using standard web browsers. So a is not a suitable choice.

Deep Web is called invisible web as it is not accessible or searchable to standard search engines like Google. Search engines cannot index the contents of these sites. However such sites do not requires specialized browsers to access. So b is not a suitable choice.

Dark Web: It is a part of Deep Web sites but it requires specialized software and browsers to access. These sites cannot be indexed and cannot be searchable through standard search engines. This is also called dark side of the world wide web darker which is frequently used by criminals, hackers, black markets, hit-men. Illegal activities on a massive level is takes place in the dark web such as access to stolen sensitive information, malware, drug trade and terrorist operations. These sites are temporary and keep changing addresses to lessen the risk of getting caught by govt agencies or security officials. So c is the suitable choice.

Crypto-Net is a kind of neural network which works with encrypted data which can make a prediction based on the data without disclosing the data and prediction to the 3rd party. So d is not a suitable option.

6 0
3 years ago
11)When, if ever, will the geometric average return exceed the arithmetic average return for a given set of returns?A) When the
grigory [225]

Answer: E. Never

geometric average return can NEVER exceed the arithmetic average return for a given set of returns

Explanation:

The arithmetic average return is always higher than the other average return measure called the geometric average return. The arithmetic return ignores the compounding effect and order of returns and it is misleading when the investment returns are volatile.

Arithmetic returns are the everyday calculation of the average. You take the series of returns (in this case, annual figures), add them up, and then divide the total by the number of returns in the series. Geometric returns (also called compound returns) involve slightly more complicated maths.

6 0
3 years ago
Other questions:
  • Is printer an input device​
    5·1 answer
  • How do you delete a slide from your presentation after selecting it
    8·1 answer
  • . One of the vulnerabilities the Morris worm used was a networking service called finger. The purpose of the finger service is t
    11·1 answer
  • Grandma Ester normally gives you hugs for your birthday - one for every year old you are. When you turned 15, she squished you w
    8·1 answer
  • Design and implement an algorithm that gets a list of k integar values N1, N2,...Nk as well as a special value SUM. Your algorit
    10·1 answer
  • Create a do-while loop that asks the user to enter two numbers. The numbers should be added and the sum displayed. The loop shou
    5·1 answer
  • . ____________is/are the JSP ImplicitObject(s).sessionapplicationconfigAll of GivenNone of Given
    9·1 answer
  • Tornado Alley is located in the middle of the United States, extending from Texas up through the Dakotas. The above statement is
    6·1 answer
  • Which of the following is NOT part of the URL for an Internet web site?
    13·1 answer
  • Data will zip through a 5G network much faster than through a 4G network because of the 10-fold difference in _____.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!