1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sukhopar [10]
4 years ago
12

Berikan contoh perameter sebuah meja.​

Computers and Technology
1 answer:
lara31 [8.8K]4 years ago
5 0

Answer:

The simplest of table parameters are rows, columns, page number, alternate row, column header, Table title, etc.

Explanation:

The simplest table parameter is as being mentioned above. Its, however, important to understand what are the parameters. Parameters are the features of an object that defines its behavior. Various parameters are the behaviors of the object hence, and here it is the table and the behavior of the table is being described with the parameters. There are so many other parameters that one can think of related to tables. And we should make a list of them for future studies. Font size, Font color, border, etc are some more from the huge list.

You might be interested in
The postorder and preorder traversal of a binary tree are given below - postorder : D E B F G C A preorder : A B D E C F G respe
jeka57 [31]

Answer: The answer is A

Explanation:

in  the attachment

6 0
4 years ago
You have 5 salespersons who work out of your office and who frequently leave their laptops laying on their desk in their cubicle
kati45 [8]

There are different ways to ensure safety of devices. The best protection to implement to address your concerns is to use cable locks to chain the laptops to the desks.

  • The use of laptop locks is as good as when compared to bicycle chain locks. One can do this by looking for a big, immovable object, such as one's desk, and thereafter you wrap the metal cable around it and then insert the lock into your laptop's lock slot.

With this, your computer becomes theft-proof.

Thia will give you piece of mind as you will not be restless anymore.

Learn more about Laptop security from

brainly.com/question/24956493

3 0
3 years ago
The word blog is made from what two terms?
mafiozo [28]
• web + log = blog •
3 0
4 years ago
When a structure must be passed to a function, we can use pointers to constant data to get the performance of a call by ________
andriy [413]

Answer:

Reference value.

Explanation:

8 0
3 years ago
What are the three aspects to consider when taking and critiquing photograph?
svlad2 [7]
The angle
Steady Hands
Focusing on the right lighting
3 0
3 years ago
Other questions:
  • What are smart mobile devices?
    6·2 answers
  • What types of issues can you most likely resolve by knowing how to access and use the control Panel?
    15·1 answer
  • There are two types of short-term memory: one type is involved in the input and storage of new information, the other type of sh
    9·1 answer
  • Joann wants to insert page numbers at the bottom of the pages of her document using the Field option in Quick
    12·2 answers
  • Which tab should be selected to add a hyperlink within a cell? Home tab Review tab Insert tab Formula tab
    12·2 answers
  • Please answer me <br> in Assignment - Algorithms
    10·1 answer
  • Write a program that uses a structure to store the following data about a customer account: Name Address City, State, and ZIP Te
    10·1 answer
  • The LCD screens are found in​
    14·1 answer
  • What information is necessary to review in order to be considered familiar with the Safety Data Sheet (SDS) of a substance
    7·1 answer
  • where element is the Hypertext Markup Language (HTML) element and _____ pairs define the styles that are applied directly to tha
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!