1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alborosie
3 years ago
9

In microsoft windows when a window is minimized what happens to that window

Computers and Technology
1 answer:
a_sh-v [17]3 years ago
8 0
It stays on what you are doing until you unminimize it to continue your work
You might be interested in
Give an example of how loops are used in programming Kturtle​
tankabanditka [31]

Answer:

Explanation:

KTurtle is an educational programming environment for turtle graphics. It is released under the open-source GNU General Public License and is part of the KDE Project since KDE3. KTurtle includes an IDE and a programming language which is loosely based on Logo and is intended for teaching programming.

5 0
3 years ago
What number is represented as a binary code of 101110
mariarad [96]

Answer:

46 i think

Explanation:

sorry if thats wrong

4 0
2 years ago
Read 2 more answers
In mathematics, the notation n! represents the factorial of the nonnegative integer n. The factorial of n is the product of all
hram777 [196]

Answer:

The program to this question can be given as:

Program:

factorial=1 #declare a variable.  

number=int(input("Enter a positive integer:")) #input a number.  

while (number>0): #loop  

   factorial= factorial*number # holding value in factorial variable  

   number=number-1  

print('=',factorial) #print value.

Output:

Enter a positive integer:6  

= 720  

Explanation:

The description of the above python program can be given as:

  • In the above program firstly we define a variable that is "factorial". In this variable, we assign a value that is 1 and it is used to calculate the factorial value.  
  • We define a variable "number". The number variable is used to take input from the user.  
  • Then we define a loop in the loop we calculate the factorial and hold the value in the factorial value in the last we print the value.  

4 0
3 years ago
The postorder and preorder traversal of a binary tree are given below - postorder : D E B F G C A preorder : A B D E C F G respe
jeka57 [31]

Answer: The answer is A

Explanation:

in  the attachment

6 0
4 years ago
You recently set up a DHCP server and need to configure your computer to start using it. Click the IPv4 properties option that y
AURORKA [14]

Answer:

Dynamic IP address configuration.

Explanation:

In information technology, there are two ways of configuring IP address on a computer system, namely static and dynamic configuration.

In the computer system, the IP address is configured by selecting the static radio button and typing in the IP address, subnet mask and default IP address. The dynamic IP address configuration requires a selected radio button indicating DHCP configuration and a DHCP server.

The DHCP server holds a range of IP addresses that is used assign IP addresses automatically to a client system.

5 0
3 years ago
Other questions:
  • A. True
    14·2 answers
  • Which of the following jobs are most likely to be in greater demand due to the increasing prevalence of mobile computing? deskto
    13·1 answer
  • In your own words, explain the role of scientific investigation in the development of the Theory of Evolution.
    6·1 answer
  • True or False<br><br> The signing of Act 26 made Cyber Harassment of a Child a crime.
    14·1 answer
  • A network administrator for a small company is contemplating how to scale the network over the next three years to accommodate p
    13·1 answer
  • Alison is having a hard time at work because her Inbox is flooded with emails every day. Some of these emails are unsolicited. S
    15·2 answers
  • Write a C++ program that would take 10 integers and outputs mean, median, and range. Create at least three functions: one for so
    7·1 answer
  • What are the benefits of building redundancy into a network?
    12·1 answer
  • How can your network be infected with malware or ransomware?
    6·1 answer
  • Suppose we want to select between two prediction models M1 and M2. We have performed 10-fold cross validation on each. The error
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!