1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zvonat [6]
4 years ago
14

When you see ##### in a cell, you should A. increase the cell width. B. increase the cell height. C. decrease the cell width. D.

decrease the cell height.
Computers and Technology
1 answer:
Usimov [2.4K]4 years ago
4 0
A. Increase the cell width this is because there is not enough room in the cell to display the number that was given. 
You might be interested in
2) Show the decimal equivalent of each of the numbers if they are interpreted as (4 answers): 11001101 01101001 a. Unsigned bina
iragen [17]

Answer:

<u>Signed:</u> -4 -5 +6 -1

<u>Unsigned:</u> 12 13 6 9

Explanation:

We are given with binary number i.e. 1100110101101001. First of all we will break this binary number into sets of 4 starting from the right side of the binary number. First set will be 1001, second will be 0110, third wil be 1101, fourth will be 1100.

<u>Basic concept of converting binary numbers into decimal numbers:</u>

256 128 64 32 16 8  4  2  1  

0      1      1    0    1  0  0  1  1

Add the number written above each of the binary number if its 1 and ignore if its 0. Starting from the left side 0 represents 256 so, we will ignore it. 1 represents 128 so we will consider it and so on.

128+64+16+2+1 = 211

011010011 is the binary of 211.

For signed binary, if the last number of the set is 0 the, it is a postive number. For unsigned binary, if the last number of the set is negative then, it is a negative number.

<u>For signed binary:</u>

1100    1101    0110   1001

-4        -5      +6       -1

<u>Note:</u>

We are not adding these numbers because in the question it is specified to give 4 answers.

<u>For unsigned binary:</u>

1100    1101    0110   1001

12        13      6       9

<u>Note:</u>

We are not adding these numbers because in the question it is specified to give 4 answers.

5 0
4 years ago
Read 2 more answers
All of the following are typical characteristics of internet predators, except white. male. between the ages of 18 and 35. high
tigry1 [53]
The one that does not belong there is high income.
7 0
3 years ago
Digital subscriber lines: a. are very-high-speed data lines typically leased from long-distance telephone companies. b. operate
nlexa [21]

Answer:

idididkdikdidkdidkdikdidk

Explanation:

7 0
4 years ago
What is the term for a set of actions carried out on inputs?
Ymorist [56]

Answer:

<u><em>Input Bindings</em></u> is the term that is used for actions carried out on inputs in automation process.

Explanation:

In Automation process different operation or tasks had been performed such as output, input, internal actions. These are known as action bindings.

At input terminal the actions that are being carried out are called Input bindings. A command is comes from control pin and data is comes from input pin. This input and control signal combines together and perform the action that is required by machine or device.

<em>This is the reason these actions performed at input device is called Input Binding.</em>

8 0
4 years ago
7.2 code practice edhesive. I need help!!
GaryK [48]

Answer:

It already looks right so I don't know why it's not working but try it this way?

Explanation:

def ilovepython():

    for i in range(1, 4):

         print("I love Python")

ilovepython()

6 0
3 years ago
Other questions:
  • Neighbor discovery performs many of the functions that icmp router discovery and icmp ____ handled in ipv4.
    13·1 answer
  • List the applications in the CyberOps menu.
    15·1 answer
  • You should always assign the Needs Met rating before assigning the Page Quality rating, T or F ?
    6·2 answers
  • Complete the function by filling in the missing parts. The color_translator function receives the name of a color, then prints i
    11·1 answer
  • Any action that causes harm to your computer is called a
    15·1 answer
  • What are the types of micro computer?​
    14·2 answers
  • The National Vulnerability Database (NVD) is responsible for actively performing vulnerability testing for every company's softw
    8·1 answer
  • Alex has composed a layout with this Image for a magazine. Which rule of composition has Alex applied?
    14·1 answer
  • One of the earliest computer networks was the ARPANET, developed in the early 1960s. The purpose of this network was to:
    13·2 answers
  • The _____ describes how data actually moves from an application on one computer to an application on another networked computer.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!