1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Novay_Z [31]
3 years ago
12

What was the #1 song in 1987 and who was the artist

Computers and Technology
2 answers:
Veronika [31]3 years ago
8 0
Billboard magazine said it was "Walk Like an Egyptian" by The Bangles.
juin [17]3 years ago
6 0
The Bangles - Walk Like an Egyptian
You might be interested in
Which of the following is not an important consideration before a business invests in a particular technology?
Sergio [31]
When investing in technology there are four types of feasibility to look for, economic feasibility which determines if the benefits outweigh the costs, operational feasibility which determines if the system is used the way it is intended, technical feasibility which determines if the technology exists to make the new system work, and schedule feasibility which determines if the technology can be implemented in a timely manner.

The only answer that does not fit one of these feasibilities is C) How does it look?
6 0
4 years ago
Which gases are carried by red blood cells? Select two options.<br> science question
kompoz [17]

Answer:

oxygen and carbon dioxide, they carry oxygen to other cells, and carbon dioxide back to the lungs.

8 0
3 years ago
Read 2 more answers
What panel in the unity Editor shows the objects in the scene
Neporo4naja [7]

Answer:

A. The Hierarchy

Explanation:

The console tells you if there are any errors

The inspector shows you settings for one object

The project is the whole thing

7 0
4 years ago
Why ads on this app do it help pay for the free stuff?
UNO [17]

Answer:

Yes

Explanation:

The ads help support the system for you using this website for free.

4 0
2 years ago
Write a program that turns a 32-bit numeric value (e.g., 0xFFFFh) and converts it to a byte array such that it can be printed to
Evgesh-ka [11]

Answer:

The program is written below,

.386

.MODEL FLAT, stdcall

.STACK 4096

GetStdHandle PROTO, nStdHandle:DWORD

WriteConsoleA PROTO,

hConsoleOutput:DWORD, ; output handle

lpBuffer:PTR BYTE, ; pointer to buffer

nNumberOfCharsToWrite:DWORD, ; size of buffer

lpNumberOfCharsWritten:PTR DWORD, ; num bytes written

lpReserved:DWORD ; not used (NULL)

ExitProcess PROTO, dwExitCode:DWORD

.data

bytesWritten DWORD 0 ; for WriteConsoleA

stdHandle DWORD 0 ; for WriteConsoleA

s1 BYTE "Hello Universe", 13, 10, 0

lenS1 = ($ - s1)

.code

_main PROC

print:

; get STDOUT handle

push -11 ; request STD_OUTPUT_HANDLE (-11)

call GetStdHandle ; call WinAPI to get console handle

mov stdHandle, eax ; save stdHandle

push 0 ; reserved, push NULL

push OFFSET bytesWritten ; bytes written

mov eax, lenS1

push eax ; bytes to write

push OFFSET s1 ; string address

push stdHandle ; STD_OUPUT_HANDLE

call WriteConsoleA ; call win api to write text to console

done:

INVOKE ExitProcess, 0

_main ENDP

END

3 0
4 years ago
Other questions:
  • Write a function name isPrime, which takes an integer as an argument and returns true if the argument is a prime number, or fals
    14·1 answer
  • Question: when using a line graph, why is it important to only graph 1-3 series of data?
    8·1 answer
  • Dialogue is not a characteristic of functional text because
    9·1 answer
  • A graphic design student is putting the finishing touches on her PowerPoint presentation for her speech. She is carefully analyz
    12·1 answer
  • What type of tool would be used to tighten a nut or bolt with an exact amount of twisting force?
    7·1 answer
  • Which of the following best describes when a packet is addressed so that more than one destination can receive it and the first
    11·1 answer
  • A small cluster of three countries (China, Malaysia, and Korea) are creating a reputation for this type of outsourcing. a. Farsh
    6·1 answer
  • How should you best communicate<br> this information to Keisha?<br> (Select all that apply.)
    13·1 answer
  • JAVA
    10·1 answer
  • A security event popped up, alerting security of a suspicious user gaining access to, and copying files from, the %systemroot%\n
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!