1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nata0808 [166]
3 years ago
6

Question 12 (1 point)

Computers and Technology
1 answer:
QveST [7]3 years ago
8 0

Answer:

margins

Explanation:

the definition margins are the edges

You might be interested in
In her presentation, Emily has inserted two tables in a slide and formatted the text on all slides. Which feature of the present
Nitella [24]
Insert table and change text
 
5 0
3 years ago
Declare and initialize the following variables: int monthOfYear, initialized to the value 11 long companyRevenue, initialized to
lianna [129]

Answer:

Following are the declaration and the initialization of variable

int monthOfYear=11;  // variable declaration of integer

long companyRevenue=5666777; // variable declaration of long

int firstClassTicketPrice=6000;  // variable declaration of int

long totalPopulation=1222333; // variable declaration of long

Explanation:

Following are the description of Statement

  • Declare a variable " monthOfYear "  as integer type and initialized  11 to them .
  • Declare a variable " companyRevenue "  as long type and initialized  5666777 to them .
  • Declare a variable "  firstClassTicketPrice"  as integer type and initialized 6000 to them
  • Declare a variable " totalPopulation "  as Long type and initialized 1222333  to them .
4 0
3 years ago
A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT ________. Select one: A. assume your i
bonufazy [111]

Answer:

Option (B) is the correct answer of this question.

Explanation:

Packet analyzer is a software application or set of infrastructure capable of unencrypted and recording communication that travels through a virtual system of a computer system.A packet analyzer used to detect network activity is recognized as a broadband monitoring system.

A packet analyzer is a code application that is used for monitoring, intercepting, and recording http requests with the help of a virtual interface.

Other options are incorrect because they are not related to the given scenario.

8 0
4 years ago
Sanford is creating an excel spreadsheet and needs to insert many worksheets to organize his data. What is the limit of the numb
Varvara68 [4.7K]

Answer:

The answer is given below in explanation section.

Explanation:

As asked in the question Sanford is creating an excel spreadsheet and needs to insert many workbooks sheets to organize his data, then what is the limit of the number of worksheets excel con contain.

The excel spreadsheet contains as many worksheets as you want but it is limited by the available memory of your computer and system resources. If you have very little memory then you cannot create many worksheets. If you have memory in GBs then you can create thousands of worksheets.

However, it is noted that to create the worksheet is not limited by Excel but it is limited by avilabe memory and system resources. If you have enough computer memory and resources like CPU power etc, then you can create worksheet as many as you want.

It is also noted that the excel worksheet is limited by its number of rows and number of columns it contains e.g. the total number of rows and columns on a worksheet are 1,048,576 rows by 16,384 columns.

If you want to study more about Excel limitation and specifications, the following link may help you

https://support.office.com/en-us/article/excel-specifications-and-limits-1672b34d-7043-467e-8e27-269d656771c3

5 0
3 years ago
Read 2 more answers
Privacy settings allow account owners to decide who can ........
schepotkina [342]
Have access to your phone info
4 0
3 years ago
Read 2 more answers
Other questions:
  • Write code to print the location of any alphabetic character in the 2-character string passCode. Each alphabetic character detec
    10·1 answer
  • When a programmer creates an abstract data type, he or she can decide what values are acceptable for the data type, as well as w
    12·1 answer
  • Se Statements
    6·1 answer
  • In a penetration test, a ________ team consists of IT staff who defend against the penetration testers. They are generally aware
    14·1 answer
  • What steps are needed for word to create an index
    6·2 answers
  • Create a cell reference in a format by typing in the cell name or
    12·1 answer
  • Identify the final stage of the object found in the image in the given text
    9·1 answer
  • Imagine that you work for a company directly related to your major. Your company is preparing for expansion and your boss, Ms. S
    14·1 answer
  • Write a statement that declares an anonymous enumerated type with the enumerators SMALL, MEDIUM, and LARGE.
    13·1 answer
  • In 2008, researchers at Princeton University demonstrated techniques to retrieve RAM contents after the computer had been powere
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!