1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lyudmila [28]
3 years ago
12

PREDATION AND EVOLUTION

Computers and Technology
1 answer:
choli [55]3 years ago
3 0

Answer:

Yes, it is correct. God is great. He gives pain but gives the ointment as well to get rid of it. God gives tougher challenges, but God also gives the guts to tackle them and win them. The story of adaptation, ad predator also goes like this. God gives spines to sea urchins to survive, and it gives the birds stronger beaks to break shells. Similarly, he gives programmers awesome brains to solve the toughest problems.

Explanation:

Please check the answer.

You might be interested in
The algorithm ADDN implements N-bit fixed-width binary addition for non-negative integers and ignores overflows. For example, AD
WITCHER [35]

Answer:

This statement is true if and only if both left most bit of both numbers after conversion in 2's complement are different.

Explanation:

If both numbers left most bit is different in 2's complement then no overflow occur and the results of the equation are same.

ADDN (TN (a), TN (b)) = TN (a + b)

This equation satisfies if and only if, 2's complement of both binary number contains left most bit different. If the left most bit of both numbers is same then after addition the bits will be overflowed and result of addition in decimal and then convert to 2's complement will not be equal and above mentioned equation will not be satisfied.

It means that if both numbers have same sign, then 2's complement of both bit have same bits, if we add those numbers in decimal and add by converting them in 2's complement and add them both have different answers.  

7 0
4 years ago
When adding cells you must use a "+" symbol, you cannot use a ":" symbol.<br><br> ☐ True<br> ☐ False
enot [183]

Answer:

False

Explanation:

We can use both. If the total number of cells are less we can use + and add like =Sum(A1 + A2 +A3)  and if cells are in sequence, and in good number then we can use ":" like =Sum(A1:A7).

With + we can only add two cells at a time, and we need to use it again and again to add all cells, like:

If we want to add in between C1 to H1, then with plus we need to write =SUM(C1+D1+E1+F1+G1+H1).

However with : we only need to write =SUM(C1:H1), and that's it.

6 0
3 years ago
What are the cause of eye strain during computer usage?
Natasha2012 [34]
It happens because your eyes follow the same path over and over. And it can get worse the longer you continue the movement. When you work at a computer, your eyes have to focus and refocus all the time. They move back and forth as you read. You may have to look down at papers and then back up to type. Your eyes react to changing images on the screen to create so your brain can process what you’re seeing. All these jobs require a lot of effort from your eye muscles. And to make things worse, unlike a book or piece of paper, the screen adds contrast, flicker, and glare.

You’re more likely to have problems if you already have eye trouble, if you need glasses but don't have them, or if you wear the wrong prescription for computer use.

Computer work gets harder as you age and the lenses in your eyes becomes less flexible. Somewhere around age 40, your ability to focus on near and far objects will start to go away. Your eye doctor will call this condition presbyopia.

5 0
3 years ago
Whats the difference between Input and Output? Give and example of an example on a M:B​
Akimi4 [234]

Answer:

Entrar en algún lugar no es como irse de algún lugar, o qué tipo de pregunta significa para mi acción

3 0
3 years ago
Write a program to accept 10 different whole number from the user and store them in a
Harman [31]

Explanation:

Question is not well presented:

The search strings in the question are not well formatted.

First thing, I'll arrange the account number in order of 7;

Meaning that the length of each account number is 7

8149420 5333174 3080098 6755963 9526981 4449539 9387197 5104726 2931356 4282637 1750219 6086650 3164838 2419590 4578589 9718904 674994 12545408

Answer:

// This program is written in C++ Programming Language

// Comments are used for explanatory purpose

// Program starts here

#include <iostream>

using namespace std;

// Initialise Function

int ArrayList(int[], int, int);

// Main Method starts at

int main()

{

// The list of account is 18; so, we Initialise an integer Variable to hold this value

const int acctlist = 18;

// Initialise an array to hold the account numbers

int List[acctlist] = { 8149420 5333174 3080098 6755963 9526981 4449539 9387197 5104726 2931356 4282637 1750219 6086650 3164838 2419590 4578589 9718904 674994 12545408

};

// Declare account number and search result Variables of type integer

int accountnumber, Result;

// Prompt user for account number

cout << "Enter a valid account number: ";

cin >> accountnumber;

// Determine if valid or not

Result = ArrayList(List, acctlist, accountnumber);

if(Result == -1){

cout << "Account number " << AcctNum << " is invalid.\n";}

else{

cout << "Account number " << List[Result] << " is valid\n";

}

return 0;

}

// Function starts here

int ArrayList(int list[], int size, int value)

{

int index = 0,

pos = -1;

bool seen = false;

// Check if Account number is seen in list

while (!seen && index < size)

{

if (list[index] == value)

{

seen = true;

}

pos = index;

}

index++

8 0
3 years ago
Other questions:
  • Exposing employee and customer personal data to an untrusted environment is an example of:
    9·1 answer
  • Hello, can you help me answer these questions?
    9·2 answers
  • How will you create an email id
    11·1 answer
  • Stealing passwords by using software code to run through various password schemes with numbers, symbols, capital letters, and ch
    6·1 answer
  • What types of tools are used in the process of a digital or network investigation?
    12·1 answer
  • Data is best described as
    10·2 answers
  • Why should running your unit test suites not take a long time?A. Unit tests aren't that important, so less time should be spent
    5·1 answer
  • How would you assign roles to your group members?
    9·2 answers
  • TO Cloud
    10·1 answer
  • Why is quantum computing potentially a better fit for weather forecasting than classical computers?.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!