1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikitadnepr [17]
3 years ago
12

Mary, Tim, John, and Jenn each sold three million dollars worth of product within six months. Each month one of them was awarded

for most sales. Use the pie charts below to determine which of the four never sold the most in a single month, though he or she sold the same amount in total.
Computers and Technology
2 answers:
photoshop1234 [79]3 years ago
5 0

if its the same chart im looking at on this page, the answer is john.

Amanda [17]3 years ago
5 0

Answer:

the answer is john i had the same question

Explanation:

You might be interested in
i got a set of headphones and when i plug them into my speakers the right side only works how do i fix the left side of them
Sladkaya [172]
Sorry I don't know what is wrong with your headphones. Maybe try plugging them into something else.
3 0
3 years ago
What does computer graphics mean?​
barxatty [35]

Answer:Computer graphics involves display, manipulation, storage of images, and experimental information for proper visualization.

( or you can say )

the products of the graphic arts, especially commercial design or illustration.

Explanation: <3

5 0
3 years ago
Which term accurately describes agile and devops
Elza [17]

Answer:

Answer: Agile is refers to an interative approuch which focuses on collaboration, costumer feedback,and small rapid releases,DevOps is considered a practice bringing development and operations teams together

Hope this is helpful for you

7 0
3 years ago
Think about the last business that you purchased a product or a service from. What three types of software might they need? Why
Anton [14]

Answer:

a web a networking site and their online purchasing

Explanation:

web for their business networking site for their employees

5 0
4 years ago
Read 2 more answers
Write a C program (doublecopy) that allows a user to extract some part of an existing file (fileSource) and copy it twice to a n
Slav-nsk [51]

Answer:

Check the explanation

Explanation:

#include <stdio.h>

#include <sys/stat.h>

#include <stdlib.h>

#include <fcntl.h>

#include <errno.h>

#include <unistd.h>

extern int errno;

struct stat st;

int main(int argc, char **argv){

  int num1 = atoi(argv[1]); // Getting num1 from user

  int num2 = atoi(argv[2]); // Getting num2 from user

  char *fileSource = argv[3];

  char *fileTarget = argv[4];

 

  int source_fd = open(fileSource, O_RDONLY); // opening the file in read only mode

  int target_fd = open(fileTarget, O_WRONLY | O_CREAT); // opening the target file in Writeonly mode if file is not found it will create

   

  char *ch = (char *) calloc(num2+num1, sizeof(char));

 

  stat(fileSource, &st);

  if(st.st_size < (num1 + num2)){

      printf("File Size is smaller than the specified bytes\n");

      read(source_fd, ch, st.st_size); // reading the file upto the end

      write(target_fd, ch, st.st_size); // write to the file

      write(target_fd, ch, st.st_size); // two times writing to the file

  }else{

      if(lseek(source_fd, (off_t)num1, SEEK_SET) < 0 ) // moving the cursor to after the specified bytes from the start

      {

          printf("Some Error occured while seeking the file");

          return -1;

      }

      read(source_fd, ch, num2); // reading num2 bytes from the source

      write(target_fd, ch, num2); // writing two times to the target

      write(target_fd, ch, num2);

     

  }

 

  return 0;

 

}

1 2 #include <stdio.h> #include <sys/stat.h> #include <stdlib.h> #include <fcntl.h> #include <errno.h> #include <unistd.h> 4

The code screenshot and code output are attached below.

3 0
3 years ago
Other questions:
  • Information storage:Select one:a. Eliminates the need for professional judgment.b. Keeps data in a form accessible to informatio
    9·1 answer
  • What programming languages should a mathematician learn?
    6·1 answer
  • A forensic investigation discovered that accounts belonging to employees who were terminated numerous years ago were recently us
    9·1 answer
  • If an online shopping site is experiencing a DDoS attack, what could be a possible impact of the attack?
    8·1 answer
  • Unlike the String class where you must pass a message to an object (instance) of the class, as in x.length( ), in order to use t
    5·1 answer
  • A typical setup for a ____ network would include computer users sharing a single internet connection.
    15·1 answer
  • What is A cell that can hold or display data​
    11·1 answer
  • Suppose we have a byte-addressable computer with a cache that holds 8 blocks of 4 bytes each. Assuming that each memory address
    7·1 answer
  • В.
    11·1 answer
  • OoooA,SDHVAcgacxgjcaNASAW dysdyxsgcdsgjsdgc
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!