1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
borishaifa [10]
3 years ago
7

COMPUTER FUNDIMENTAL HELP 15 POINTS!! RESEND IT

Computers and Technology
2 answers:
Korolek [52]3 years ago
8 0
Omg you love Ariana Grande too
a_sh-v [17]3 years ago
6 0
1.) 12 crimes in October.
2.) 5 crimes of extortion in June.
3.) There was 9 crimes committed that had a take of less than $60,000.
4.) There were 3 extortion crimes with mobsters whose last name started with B.
You might be interested in
How you will install an operating system on your computer
defon
Someone can install an operating system by disk or removable storage media.

Disk being floppy, tape or commonly a DVD.

Removable storage being a USBdrive.
5 0
3 years ago
A banded table appears with
Triss [41]

Answer:

banded rows and banded columns with alternate rows and columns in different colors and shades.

And hence, A different shading colors for odd even rows.

Explanation:

Suppose you have a plenty of data in a spreadsheet. It has been found that if the rows and columns are being shown through color banding, then they look quite pleasant to our eyes. And the options for the columns and rows banding  helps us in developing bands that are formed alternatively, and one being colored and the other being shaded. And all these are rows and columns. So we have banded rows and banded columns. And you can make this by converting the sheet to table, and then using the table style.

7 0
4 years ago
Variable X is a *
xxTIMURxx [149]

Answer:

Variable X is a local variable.

Explanation:

X exists only inside the sub.

6 0
3 years ago
Consider the eight bit signed binary number 1110 0101. Convert it to signed decimal from assuming the signed binary number is re
lapo4ka [179]

Answer:

-26

Explanation:

The given binary number is 1110 0101. Also given that the signed binary number is represented using one's compliment.

We begin by computing the 1s complement representation of 1110 0101 by inverting the bits: 00011010

Converting 00011010 to decimal, it corresponds to 26.

So the 1s complement of the original number is 26. This means that the original number was -26.

7 0
3 years ago
Someone to explain one by one of the 7 C's in communication skills​
antiseptic1488 [7]

Answer:

clear)

be clear about the purpose of the message you’re delivering.

concise)

When communicating messages of this nature it’s important to stick to the point and keep your messages short and simple.

concrete)

When shaping your communication you must ensure that you are specific and that the logic and messages that you’re using fit together, build on each other and support each other.

correct)

It’s essential that both the factual information and the language and grammar you use are correct.

coherent)

If your communications are not coherent they will not be effective.

complete )

When creating a message, it’s important to give the recipient all of the information they need to follow your line of reasoning and to reach the same conclusions you have.

courteous)

You can increase the effectiveness of your communications by being polite and showing your audience that you respect them.

Explanation:

6 0
3 years ago
Other questions:
  • How many results are shown by default when using a Top or Rare Command?
    13·1 answer
  • Which osi reference model layer includes all programs on a computer that interact with the network?
    13·1 answer
  • 1.) You are a digital forensic examiner and have been asked to examine a hard drive for potential evidence. Give examples of how
    13·1 answer
  • What statement best describes what a circle graph shows
    13·1 answer
  • Place the steps in order to keep a graphic from spilling over into the next page and to include the text it is assciated with.
    12·1 answer
  • The user can set their own computer hostname and username. Which stage of the hardware lifecycle does this scenario belong to?
    6·1 answer
  • How is a geometric constraint different from a numeric constraint?
    12·1 answer
  • The most infuential programming language is ______.
    7·1 answer
  • Briefly describe the fundamental differences between project-based and product-based Software Engineering.
    10·1 answer
  • Can you please provide sample rexx code?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!