1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
snow_tiger [21]
3 years ago
14

A banded table appears with

Computers and Technology
1 answer:
Triss [41]3 years ago
7 0

Answer:

banded rows and banded columns with alternate rows and columns in different colors and shades.

And hence, A different shading colors for odd even rows.

Explanation:

Suppose you have a plenty of data in a spreadsheet. It has been found that if the rows and columns are being shown through color banding, then they look quite pleasant to our eyes. And the options for the columns and rows banding  helps us in developing bands that are formed alternatively, and one being colored and the other being shaded. And all these are rows and columns. So we have banded rows and banded columns. And you can make this by converting the sheet to table, and then using the table style.

You might be interested in
The main part of your program has the following line of code.
Arlecino [84]

Answer: D

Explanation:

It is not A or C because the "d" in "Divide" is capitalized and the d is lowercase in calling the function. Therefore the answer is D (the last choice) because numA / numB (30 / 5) equals 6.

5 0
3 years ago
Mention 3 components that can be found at the back and front of the system unit​
Radda [10]

Answer:

<u>Back</u>

Power port, USB port, Game port

<u>Front</u>

Power button, USB port, Audio outlet

Explanation:

There are several components that can be found on the system unit.

In most (if not all) computer system units, you will find more component at the back side than the front side.

Some of the components that can be found at the back are:

Ports for peripherals such as the keyboard, mouse, monitor, USB ports, power port, etc.

Some of the components that can be found at the back are:

The power button, cd rom, audio usb ports, several audio outlets, video port, parallel ports, etc.

Note that there are more components on the system units. The listed ones are just a fraction of the whole components

3 0
3 years ago
Each time the enter key is pressed, word creates a new paragraph. (points : 2) true false
ludmilkaskok [199]
Your answer would be true
6 0
3 years ago
1 #include 2 3 int max2(int x, int y) { 4 int result = y; 5 if (x &gt; y) { 6 result = x; 7 } 8 return result; 9 } 10 11 int max
Serhud [2]

Answer:

7

Explanation:

#include <stdio.h>

int max2(int x, int y) {

   int result = y;

   if (x > y) {

       result = x;

   }

   return result;

}

int max3(int x, int y, int z) {

   return max2(max2(x,y),z);

}

int main() {

   int a = 5, b = 7, c = 3;

   printf("%d",max3(a, b, c));

   printf("");

   return 0;

}

Hi, first of all, next time you post the question, it would be nice to copy and paste like above. This will help us to read the code easily. Thanks for your cooperation.

We start from the main function:

The variables are initialized → a = 5, b = 7, c = 3

max3 function is called with previous variables and the result is printed → printf("%d",max3(a, b, c));

We go to the max3 function:

It takes 3 integers as parameters and returns the result of → max2(max2(x,y),z)

Note that max2 function is called two times here (One call is in another call actually. That is why we need to first evaluate the inner one and use the result of that as first parameter for the outer call)

We go to the max2 function:

It takes 2 integers as parameters. If the first one is greater than the second one, it returns first one. Otherwise, it returns the second one.

First we deal with the inner call. max2(x,y) is max2(5,7) and the it returns 7.

Now, we need to take care the outer call max2(7, z) is max2(7, 3) and it returns 7 again.

Thus, the program prints 7.

6 0
2 years ago
Which mitigation technique would prevent rogue servers from providing false ip configuration parameters to clients?
IrinaVladis [17]
DHCP snooping is a mitigation technique<span> to </span>prevent rogue<span> DHCP </span>servers  <span>from </span>providing false IP configuration parameters to clients.  DHCP snooping<span> is a security feature that acts like a firewall between untrusted hosts and trusted </span>DHCP<span> servers. It is</span><span> a series of techniques applied to improve the security of a </span>DHCP<span> infrastructure. </span>
6 0
3 years ago
Read 2 more answers
Other questions:
  • If a database named Contacts has a table named tblEmployees and another database named Orders links to that tblEmployees table,
    8·1 answer
  • Assuming you have a TCF free student checking account, how many maximum overdraft fees can you incur in one day?
    12·1 answer
  • If some1 emails u and u want to know who it was how do u find that out
    10·2 answers
  • Which command is not one of the available Change Case options?
    11·1 answer
  • An inventory clerk, using a computer terminal, views the following on screen: part number, part description, quantity on hand, q
    8·1 answer
  • You are a network engineer tasked with performing a site survey for a multiple-channel architecture (MCA) system in a three-stor
    11·1 answer
  • Describe three perimeter intrusion detection systems and give an example of one that you have seen deployed either at work or an
    8·1 answer
  • Using complete sentences post a detailed response to the following.
    13·1 answer
  • What is the main difference between a peripheral device and other types of devices? Choose the best answer.
    12·1 answer
  • How do people decide their ethical behavior
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!