1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Advocard [28]
3 years ago
12

The inside color of text or of an object is called the:

Computers and Technology
1 answer:
AnnyKZ [126]3 years ago
8 0
Fill color is the answer hope this helps
You might be interested in
Create a method remove Evens that removes all even elements from an ArrayList of
igor_vitrenko [27]

Answer:

#include <iostream>

# include <conio.h>

using namespace std;

main()

{

int size;

cout<<"enter the size of array";

cin>>size;

int a[size],b[size];

for (int i=0;i<size;i++)

{

cout<<"enter the value in array a"<<i;

cin>>a[i];

}

for (int k=0;k<=size;k++)

{

{

 if (a[k]%2==0)

 {

  for (int l=k; l<=size;l++)

  {

   

  a[l]=a[l+1];

   

   

     }

     size=size-1;

 }

   

}

}

cout<<"\nArray list without even";

for(int j=0;j<size+1;j++)

{

cout<<"\n"<<a[j];

}

getch();

}

Explanation:

There is an array taken of variable size, the program has been written to delete the even elements from the array list. In this program "size " is the integer variable that is taken to mention the total elements of the array. Then enter the values on different index of array.

After that program find the even values and then delete these values. After the operation new array will be displayed on output.

3 0
4 years ago
Which of the following is a good technique to use when driving in an urban environment
nadya68 [22]

Answer:

A. Passing

Explanation:

Passing is a good technique to use when driving in an urban environment .

5 0
3 years ago
Read 2 more answers
Ucf the ability to connect data in different tables in a database through a common field is sometimes referred to as a ____.
kari74 [83]
Much like humans, databases have relationships too.
4 0
3 years ago
The __________ certification program has added a number of concentrations that can demonstrate advanced knowledge beyond the bas
Sophie [7]

Answer:

CISSP

Explanation:

The CIDDP concentrations are an extension and development on the knowledge and credentials of the standard CISS certification that improves employability and career advancement

The CISSP concentrations includes

Information System Security Architecture Professional which can be known as ISSAP

Information System Security Engineering Professional which can be known as ISSEP

Information System Security Management Professional which can be known as ISSMP.

4 0
3 years ago
recursive function that accepts a stack of integers as a parameter and replaces every even value in the stack with two occurrenc
slega [8]

The solution is to keep all values in the Function Call Stack until the stack is empty. When the stack is empty, place all held items at the bottom of the stack one by one.

What is Recursive Function?

Recursive functions in code frequently rely on loop setups, in which the initial variable is called on multiple times while the loop is changing it. The factorial is a simple example of a recursive function in which an integer is multiplied by itself while being incrementally lowered. Many other self-referencing functions in a loop, for example, where n = n + 1 given an operating range, could be called recursive functions.

In addition to simpler recursive functions, programmers and others have created much more complex functions that also use recursion principles. Some, such as the Fibonacci sequence, have applications in finance and other fields, while others are esoteric and largely restricted to the IT community.

To learn more about Recursive Function, visit: brainly.com/question/28540529

#SPJ4

3 0
2 years ago
Other questions:
  • While working on a group project, you notice something does not look right in the presentation. You call a meeting with your tea
    14·2 answers
  • GenXTech is a growing company that develops gaming applications for military simulations and commercial clients. As part of its
    8·1 answer
  • In this problem you will test and analyze the following sorting algorithms: Selection, Bubble, Insertion, Merge, and Quick. You
    14·1 answer
  • Case-Based Critical Thinking Questions​Case 1: Tony’s Pizza &amp; Pasta​Tony’s Pizza &amp; Pasta restaurant uses an application
    9·1 answer
  • 1. Answer the following questions: a. What are the different types of number system? Name them.​
    8·1 answer
  • So I bought a mechanical keyboard with cherry mx red switches. you're called "linear and silent" they are linear but they aren't
    10·1 answer
  • You're expecting visitors who will be demanding Mamet access Before they arrive, you can activate a Guest network that has its o
    11·1 answer
  • In a mobile app for computer technicians in a large college, an initial trigger event could be ____.
    7·1 answer
  • Why entity relationship model is used for data manipulation??<br><br>​
    15·1 answer
  • In the program evaluation and review technique (PERT), a delay in ________ will cause the entire project to fall behind. Multipl
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!