1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zigmanuir [339]
2 years ago
12

What is the seventh byte in the roller coasters file?

Computers and Technology
1 answer:
Llana [10]2 years ago
3 0

Space (00100000)

The answer is this, i have no idea why i just googled on quizlet which is a pretty good site for answers as well heres the link:

https://quizlet.com/187465937/computer-science-unit-1-flash-cards/                        

You might be interested in
Human centered technology often recommends a0 to computer designers and manufacturers, telling them how to make systems and the
IceJOKER [234]

Human centered technology often recommends best practices to computer designers and manufacturers, ...............

Human-Computer Interaction is a study that particularly focuses more on the design of computer technology and the interaction between humans and computers. Since the 1980s when HCI surfaced, it has become a crucial tool in popularizing the idea that the interaction between a user and a computer should resemble a human-to-human, open-ended dialogue. When HCI is done well, a human-centered approach powers the creation of products that resonates more deeply with a certain audience. This will ultimately drive engagement and growth.

6 0
3 years ago
Read 2 more answers
Which of the following describe a required
ELEN [110]

Answer:

The last 2 point in the given question is the correct answer to the given question i.e

  • an argument passed to the function in the  correct positional order
  • an argument wherein the number of  arguments in the function call should match  the definition of the function.

Explanation:

The required  argument are those argument that are passing to the method the in the right location order.In the required argument the number of arguments in the call method must match the definition of the function .

For example

def fun( s ): #function definition  

   print(s) #display s

fun('er')#calling

In this example  there is  function fun() in which we pass the argument 'er'  we call that function from main() .The control moves to the function definition it checks the number of argument in the calling function fun() is matched with the definition of function fun()  and print 'er'.

All the other option are not describing the required  argument that's why this is incorrect option .

8 0
3 years ago
Jody should select the
Alex Ar [27]

Answer:

In the View tab, you will find Zoom Option. Set the Zoom level to 100%.

Explanation:

You need to set the Zoom level to 100%, And you can do this, by setting the zoom level to 100%, from the scroll bar. Or you can move to view tab in the main menu, and then in the Ribbon, you need to select the zoom % and set it to 100 percent. You will then be able to see the entire page. And if you want, you can increase the Zoom level to even further, for getting an even more clearer picture.

3 0
3 years ago
which of the following is not a name of one of the central features of Facebook timeline activity log Graph Search for Daily New
Pani-rosa [81]
The correct answer is Graph Search for Daily News

This does not exist on Facebook, unlike the timeline and the activity log.
3 0
3 years ago
When a support agent does not know the answer to a question, a good incident management strategy is to tell the user ____.
laiz [17]

When you don't know the answer to a question, a good incident management strategy is to tell the user that you'll research the question and get back to him or her.

<h3>What is incident management?</h3>

Incident management can be defined as a strategic process through which a business organization or company identifies, analyzes, and correct hazards, so as to ensure that normal service operation is restored as quickly as possible to end users after a disruption, as well as to prevent a re-occurrence of these hazards in the future.

As a support agent, if you don't know the answer to a question, a good incident management strategy is to tell the user that you'll research the question and get back to him or her at a latter time.

Read more on incident management here: brainly.com/question/11595883

4 0
2 years ago
Other questions:
  • Timing circuits are a crucial component of VLSI chips. Here’s a simple model of such a timing circuit. Consider a complete balan
    10·1 answer
  • What will allow you to purchase software without receiving full rights to the program?
    14·1 answer
  • 15. The text of a desktop publishing document is often created using
    6·2 answers
  • If the computer has an encrypted drive, a ____ acquisition is done if the password or passphrase is available. a. passive b. sta
    8·1 answer
  • True or False <br><br> Rootkits are only made by black-hat hackers.
    8·1 answer
  • In which situations would it be most helpful to filter a form? Check all that apply.
    8·1 answer
  • Computer can do work very___​
    7·2 answers
  • If my usb could unlock my computer with a tool then could i be able to open it using ip unlock
    9·1 answer
  • The following is a function:
    6·1 answer
  • A good algorithm should have which three components?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!