1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natita [175]
3 years ago
7

Why did latex replace wax?

Computers and Technology
1 answer:
andrezito [222]3 years ago
3 0

Answer:

Latex replaced wax because it did the same thing and was used for the same things that wax would be used for

Explanation:

You might be interested in
Write a method swaparrayends() that swaps the first and last elements of its array parameter. ex: sortarray = {10, 20, 30, 40} b
Alexus [3.1K]
In the C programming language, you can't determine the array size from the parameter, so you have to pass it in as an extra parameter. The solution could be:

#include <stdio.h>

void swaparrayends(int arr[], int nrElements)
{
int temp = arr[0];
arr[0] = arr[nrElements - 1];
arr[nrElements - 1] = temp;
}


void main()
{
int i;
int myArray[] = { 1,2,3,4,5 };
int nrElements = sizeof(myArray) / sizeof(myArray[0]);
swaparrayends(myArray, nrElements);

for (i = 0; i < nrElements; i++)
{
printf("%d ", myArray[i]);
}

getchar();
}

In higher languages like C# it becomes much simpler:

        static void Main(string[] args)
        {
            int[] myArray = {1, 2, 3, 4, 5};
            swaparrayends(myArray);
            foreach (var el in myArray)
            {
                Console.Write(el + " ");
            }

            Console.ReadLine();
        }

        static void swaparrayends(int[] arr)
        {
            int temp = arr[0];
            arr[0] = arr.Last();
            arr[arr.Length - 1] = temp;
        }

3 0
3 years ago
SYN scanning is a tactic that a malicious hacker (or cracker) can use to determine the state of a communications port without es
Mashutka [201]

Answer:

A closed port that can not receive request from authorized users.

Explanation:

Networks comprises of end devices, routing and switching devices, servers, technical control devices etc. The communication and interconnection of these devices makes up a secure and resourceful network.

Attackers can exploit loopholes in networks to steal information. The attackers uses the SYN scanning or cracking technique to implement the DOS or denial of service attack.

DOS is used to flood ports on a server in a network, preventing authorized user access, as they steal information to avoid detection.

8 0
4 years ago
Which avenue may utilize video streaming, audio narration, print designs, and animation?
astra-53 [7]

Answer: is their any options to answer your question

Explanation:

4 0
3 years ago
Read 2 more answers
Create a float variable named circumference.
Likurg_2 [28]

Answer:

Float circumference; // Create a float variable

Explanation:

The float datatype is used for storing the decimal point values .The syntax  to declaring  any float variable is given below.

float variable-name;

float  circumference; // create a float variable

circumference=89.9007;; // store the value in circumference

Following are program in c++

#include <iostream> // header file

using namespace std; //namespace

int main() // main function

{

   float circumference; // creating variable float

   circumference=89.9007; // storing value

   cout<<circumference;  // display value circumference

   return 0;

}

Output:

89.9007

5 0
3 years ago
50 POINTS
mars1129 [50]

Answer:

B. Ctrl+H

Explanation:

6 0
4 years ago
Read 2 more answers
Other questions:
  • The picture that graphically represents the items you use in windows is called a/an
    5·1 answer
  • Indenting the start and finish of segments
    8·2 answers
  • The communication channel used in IMC must rev: 12_06_2018_QC_ CDR-223 Multiple Choice match the traditional channel used in tha
    14·1 answer
  • OSHA standards appear in the ___________ and are then broken down into ____________.
    9·1 answer
  • A(n) _______________ is a collection of configuration and security settings that an administrator has created in order to apply
    14·1 answer
  • From which type of data storage does the CPU load information for processing during normal operation?
    14·1 answer
  • Which cable standard is a standard for newer digital cable, satellite, and cable modem connections?
    11·1 answer
  • If a machine cycle is 2 nanoseconds , how many machine cycles occur each second?
    7·1 answer
  • Find 10 real world challenges and their corresponding solutions
    13·1 answer
  • Clara works behind a computer all day. She gets a lot of headaches, and her eyes have been hurting her lately. Her doctor diagno
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!