1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dexar [7]
3 years ago
8

Which functions are available in a Word table? Check all that apply.

Computers and Technology
1 answer:
dexar [7]3 years ago
3 0
All of them are available
You might be interested in
__________ are the first line of defense against unsafe drivers.
vova2212 [387]
Peace officers are the first line of defense against unsafe drivers. These officers are appointed for a specific purpose of upholding law and order, so they would be the ones who are there to help you in case of an accident caused by unsafe drivers. A peace officers is just another term for a law enforcement officer, or just the police.
5 0
2 years ago
Explain why it is important to follow a course or a program in keeping with your value system​
kirill [66]

Answer:

The American educational system offers a rich set of options for the foreign student. There are such a variety of institutions, programs, and places to choose from that the choice can be overwhelming for students, even those from the United States. As you begin your search for institutions, it is important that you familiarize yourself with the American educational system. Understanding the system will help you narrow down your options and develop your educational plan.

Explanation:

Sorry if it doesn't look like the question.

7 0
2 years ago
How to understand amortized analysis potential?
MA_775_DIABLO [31]
Since you gave kind of a vague question. I'll just go with the basics. Amortized analysis in computer science is basically the study of worst case run times regarding a sequence of operations.

When looking at potential, it is the physicist's method.
phi (initial state) =0 and every state after is larger than 0.
It keeps track of time but relies on states to know where it is.

The equation C +phi (state')-phi(state) is the main equation. C is the time for an operation, "state" is before and "state'" is after.

There are sets of equations that dictate average run time with this.

ex.
phi (H)= 2n-m. n=number of elements, m=size of array.
This equation is used to calculate the time to double the size.
4 0
3 years ago
1.) what is the minimum number of bits required to represent -3,997 using 2's complement form?
lisabon 2012 [21]

The binary representation of +3997 is 1111 1001 1101.

In one's complement this is simply adding a sign bit and inverting all the bits:

1 0000 0110 0010

The two's complement is the one's complement plus 1:

1 0000 0110 0011

That's 13 bits. Normally the sign bit would be at an 8, 16 or 32,... bit boundary.

For -436 it's 10 0100 1100 and 10 bits


8 0
3 years ago
Software that instructs the computer how to run applications and controls the display/keyboard is known as the
saw5 [17]
Answer is : operating system
8 0
3 years ago
Other questions:
  • If your bank is a member of the fdic, what does that mean for you?
    10·2 answers
  • Design a method for representing the state of a tic-tac-toe board in computer memory. can you fit your representation into three
    12·2 answers
  • According to a recent study, more than 75 percent of teens between the ages of twelve and seventeen in the United States have a
    11·2 answers
  • Replmon is the first tool you should use when troubleshooting Active Directory replication issues. State True or False.
    12·1 answer
  • Intranets:
    8·1 answer
  • Rolulzoss<br>A. State three positive uses of computers in the government sector​
    10·1 answer
  • What means the data is still saved even if you turn the computer off or unplug it?​
    5·1 answer
  • Which type of computer is used to process large amount of data​
    15·2 answers
  • Which tab should a user click to access the Page Borders feature of Word?
    13·2 answers
  • What type of an attack is being executed if an attacker substituted an invalid mac address for the network gateway so no users c
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!