1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
forsale [732]
3 years ago
14

_____ rows indicate that there is different formatting for odd and even rows.

Computers and Technology
1 answer:
Sladkaya [172]3 years ago
5 0
Banded rows indicate that there are different formatting for odd and even rows.
You might be interested in
A system is being developed to help pet owners locate lost pets. Which of the following best describes a system that uses crowds
Slav-nsk [51]

Crowdsourcing  is used by mobile application that allows users to report the location of a pet that appears to be lost.

<h3>What is a mobile application?</h3>

A mobile application is known to be a kind of computer app or program that has been made to handle or run itself on a mobile device e.g. phone,  etc.

Conclusively, the option that best describes a system that uses crowdsourcing is the mobile application that allows users to report the location of a pet that appears to be lost and upload a photo that is made available to other users of the application and thus everyone can help to look for it.

Learn more about mobile application  from

brainly.com/question/9477543

#SPJ1

6 0
2 years ago
Does anyone know who this man issss?
devlian [24]

Kaeya Should be the correct answer

3 0
3 years ago
You recently discovered that several key files of your antivirus program have been deleted. you suspect that a virus has deleted
liraira [26]

Retro recently discovered that several key files of your antivirus program have been deleted.

<h3>What is antivirus example?</h3>

New versions of Microsoft Windows even include Windows Defender, which with the latest versions of Windows can defend against computer viruses. Other well-known antivirus programs include Norton antivirus and McAfee, and popular free antivirus programs include Avast and AVG.

<h3>Which antivirus is best for laptop?</h3>

McAfee Antivirus Plus is our top choice for multiple devices because its subscriptions offer protection for every device in the home for a reasonable cost.

To learn more about Antivirus Plus, refer

brainly.com/question/28050091

#SPJ4

4 0
2 years ago
Given a variable n refers to a positive int value, use two additional variables, k and total to write a for loop to compute the
maksim [4K]
You could do it like this (example for n=5).

int n = 5;
int total = 0;
for (int k = 1; k <= n; k++) total += k*k*k;

5 0
3 years ago
Declare a constant MONTHS_IN_DECADE, whose value is the value of the constant MONTHS_IN_YEAR (already declared) multiplied by 10
MariettaO [177]

Answer:

The solution code is written in Python:

  1. MONTHS_IN_YEAR = 12
  2. MONTHS_IN_DECADE = MONTHS_IN_YEAR * 10

Explanation:

Constant variable is a type of variable that holds value which will not be changed. This means the value will only be assigned to the constant variable once. As a convention, constant variable is named with all uppercase letters to differentiate it from other variables.

By presuming there is a constant variable, MONTHS_IN_YEAR which has been declared and assigned with 12 (Line 1).

Next, we create another constant variable, MONTHS_IN_DECADE, and we can calculate the decade by using the value of constant variable MONTHS_IN_YEAR multiplied with 10 and assign the result to  MONTHS_IN_DECADE (Line 2).

3 0
3 years ago
Other questions:
  • Pls answer asap do not use internet
    10·1 answer
  • When the packet leaves the router, which source and destination ip addresses will be contained in the packet?
    9·1 answer
  • People use a computer connected to the internet to manage financial accounts
    15·1 answer
  • How do I make my own extension for chrome?
    7·1 answer
  • You type a web address in your web browser. order the steps, which describe the internet name resolution process for the web add
    7·1 answer
  • A hidden backlog contains the projects that the IT department is not aware of because of low feasibility.
    13·1 answer
  • Implement the RC4 stream cipher in C++. User should be able to enter any key that is 5 bytes to 32 bytes long. Be sure to discar
    7·1 answer
  • What is the output of the C++ codeabove?
    14·1 answer
  • Say true or false
    10·2 answers
  • Identifiy the impact of new technology for your organizations <br>​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!