1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gnom [1K]
1 year ago
15

What is the function of tab?​

Computers and Technology
1 answer:
Sholpan [36]1 year ago
5 0

Answer:

The function of the tab is used to advance the cursor to the next tab key.

You might be interested in
Now now now now mowewweedeeee
gavmur [86]

Answer:

15

Inside the type declaration, you specify the maximum length the entry can be. For branch, it would be 15.

I can't seem to type the full "vc(15)" phrase because brainly won't let me.

4 0
3 years ago
3.17 (LAB) Ch 5 Warm up: Drawing a right triangle (Python 3) This program will output a right triangle based on user specified h
andre [41]

Answer:

Find answers below

Explanation:

triangle_char = input('Enter a character: ')

triangle_height = int(input('Enter triangle height: '))

print('')

for j in range (triangle_height):

   print((triangle_char) * (j + 1))

#below are sample output that can be gotten with predefined values

$ ./triangles.py  

Enter characters: jk

Enter height: 8

j

jj

jjj

jjjj

jjjjj

jjjjjj

jjjjjjj

jjjjjjjj

k

kk

kkk

kkkk

kkkkk

kkkkkk

kkkkkkk

kkkkkkkk

3 0
3 years ago
Creating a Venn diagram takes specialized computer software.
DerKrebs [107]

Answer:

F

Explanation:

false because you don't need a computer software to make a venn diagram you can make one

8 0
3 years ago
Read 2 more answers
Describe encryption at gateways in thePresentation layer of the OSI Reference Model
puteri [66]

Answer:  

In the presentation layer of the OSI reference model provides a variety of coding and functions that can be applied in application layer data. Information send by the application layer are ensured by these functions. As, presentation layer is the important layer in the OSI reference model because it is responsible for important services like  data compression, data conversion, decryption and encryption.

Encryption at gateway is defined as, when the important data is first encrypted using protocol and then it is transferred in the network. And gateway re-director operates in the presentation layer.

4 0
2 years ago
; This program replaces the value in R0 with its absolute value. ; ; It does NOT modify any other registers! ; .ORIG x0200 START
olasank [31]

Using the knowledge in computational language in LC-3 Assembly it is possible to write a code that replaces the value in R0 with its absolute value

<h3>Writting the code </h3>

       .ORIG x0200

START

       AND R0, R0, #0  ; copy R0 to itself to set the condition codes based on R0;

                       ; i.e performing addition operation with Zero option to set the flags

       BRzp DONE       ; if R0 is NON-NEGATIVE, skip the negation (already correct);

                       ; Branch to DONE if number is poistive

       NOT R0, R0      ; R0 is negative, so negate it i.e taking 2's complement

       ADD R0, R0, #1  ; R0 = -R0 is performed successfully

DONE    BR START

       

       .END

See more about  LC-3 Assembly at brainly.com/question/12978370

#SPJ1

4 0
1 year ago
Other questions:
  • Dominick has been hired to design a network for Pirate Press. In a paragraph of no less than 125 words, discuss what he needs to
    12·2 answers
  • Using Python
    14·1 answer
  • If you wanted to search for emails containing the word advanced and prevent emails containing the word new from appearing in the
    14·1 answer
  • Hi I am Khine Mye and I want to ask you a question I don't know that is square root of 2 is 1.4 and how to get that 1.4 and plz
    8·1 answer
  • True / False<br> The exponent in floating point is stored as a biased value.
    9·1 answer
  • Find the Nearest Repeated Entries in an Array People do not like reading text in which a word is used multiple times in a short
    15·1 answer
  • Assume that you want two C# or C++ programs to share some data. You can write the first program so that it writes it's output to
    5·1 answer
  • R6. Suppose N people want to communicate with each of N - 1 other peo- ple using symmetric key encryption. All communication bet
    13·1 answer
  • Which properties would be useful to know to search for a Word document? Check all that apply.
    7·1 answer
  • A (n) ___ system can help a business alleviate the need for multiple information systems.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!