1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tcecarenko [31]
3 years ago
12

2.) Multiple choice questions

Computers and Technology
1 answer:
tigry1 [53]3 years ago
6 0

Answer:

The answer to this question is given below in the explanation section.

Explanation:

Which function key is used to update the total in cell?        

<u>(a) F7 </u>

(b) f8

(c) f9      

The intersection of a column and row is called a

(a) Border

(b) table

<u>(c) cell</u>

<u></u>

Tables group is present on the  tab.

(a) layout

<u>(b) insert </u>

(c) home        

Which key combination moves the cursor to the previous cell?

(a) Tab + alt

<u>(b) shift + tab </u>

(c) none of these      

5. Which style affects the selected text within a paragraph?

(a) Character style

<u>(b) paragraph style </u>

(c) built-in style

You might be interested in
What type of machine is a hand drill?<br><br> A. Simple machine <br> B. Compound machine
Shalnov [3]
<span>It is a Compound machine.</span>
7 0
4 years ago
Read 2 more answers
In basic network scanning, ICMP Echo Requests (type 8) are sent to host computers from the attacker, who waits for which type of
Hoochie [10]

Answer:

d. ICMP Echo Reply (type 0)

Explanation:

ICMP or internet control message protocol is an Internet layer protocol in the TCP/IP suite. It works together with routing devices like the router to send messages based on results sensed in the network.

The RFC 1122 has stated that the ICMP server and end user application be configured or installed in user devices, for receiving and sending ICMP echo request packets and reply. The process is called pinging.

For an attacker to implement ping of ping, he needs to confirm if the target user in live by sending an ICMP echo request packet type 8, to receive an ICMP echo reply type0.

4 0
3 years ago
In this scenario, two friends are eating dinner at a restaurant. The bill comes in the amount of 47.28 dollars. The friends deci
pickupchik [31]

Answer:

The java program for the given scenario is as follows.

import java.util.*;

import java.lang.*;

public class Main

{

   //variables for bill and tip declared and initialized

   static double bill=47.28, tip=0.15;

   //variables for total bill and share declared

   static double total, share1;

public static void main(String[] args) {

    double total_tip= (bill*tip);

    //total bill computed

    total = bill + total_tip;

    //share of each friend computed

    share1 = total/2;

    System.out.printf("Each person needs to pay: $%.2f", share1);  

}

}

Explanation:

1. The variables to hold the bill and tip percent are declared as double and initialized with the given values.

static double bill=47.28, tip=0.15;

2. The variables to hold the values of total bill amount and total tip are declared as double.

3. All the variables are declared outside main() and at class level, hence declared as static.

4. Inside main(), the values of total tip, total bill and share of each person are computed as shown.

double total_tip= (bill*tip);

total = bill + total_tip;

share1 = total/2;

5. The share of each person is displayed to the user. The value is displayed with only two decimal places which is assured by %.2f format modifier. The number of decimal places required can be changed by changing the number, i.e. 2. This format is used with printf() and not with println() method.

System.out.printf("Each person needs to pay: $%.2f", share1);  

6. The program is not designed to take any user input.

7. The program can be tested for any value of bill and tip percent.

8. The whole code is put inside a class since java is a purely object-oriented language.

9. Only variables can be declared outside method, the logic is put inside a method in a purely object-oriented language.

10. As shown, the logic is put inside the main() method and only variables are declared outside the method.

11. Due to simplicity, the program consists of only one class.

12. The output is attached.

5 0
4 years ago
Read 2 more answers
1.<br> Which of the following is NOT caused by alcohol?
Alla [95]

Answer:

What are the choices

7 0
4 years ago
Read 2 more answers
The file extension for an MS Excel spreadsheet is ______.<br><br> avi or xls
anygoal [31]
XLS would be it, avi contains like sounds and stuff
6 0
3 years ago
Read 2 more answers
Other questions:
  • What is an enterprise system
    14·2 answers
  • Which of the following is 1000 of a second​
    15·1 answer
  • The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals
    5·1 answer
  • Definition of powerpoint animation
    14·1 answer
  • Which of these statements about tags is false?
    12·1 answer
  • 1
    13·1 answer
  • if you were determining what was expected of you simply by looking at media, what messages would you take away?
    8·2 answers
  • Why is the Microsoft website considered the best source for information about pagefile.sys?​
    15·1 answer
  • When working in outline mode, press __________ and click the eye icon to change only one layer back to preview mode.
    10·1 answer
  • To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!