1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vivado [14]
3 years ago
14

A project manager type a document and print it he is using

Computers and Technology
1 answer:
IRINA_888 [86]3 years ago
3 0
He is using a Computer to type out the document, and a Printer for printing the document.
Thank you!
You might be interested in
Which of the following code segments will display all of the lines in the file object named infile, assuming that it has success
zimovet [89]

Answer:

d.

for line in infile :

   print(line)

Explanation:

for loop is used to iterate through the each line of the file using line variable. The file is accessed using the object infile. For example if the file name is "file.txt" and it is opened in read mode. It contains the following lines:

hi there friend

how are you

what are you doing

Then the above given chunk of code gives the following output

hi there friend

how are you

what are you doing

At each iteration each line of the the file is printed on the output screen. The print() method is used to display these lines in output.

5 0
3 years ago
Which sql server 2012 edition is targeted at hosted, internet-facing deployment?
Mice21 [21]
<span>The Web version will work for this type of need. This version runs at a slightly lesser capability than the full version, but will still perform many of the advanced functions of SQL Server. The processor and RAM utilizations are a bit less than the maximum provided in other versions.</span>
7 0
3 years ago
In the following code, what is the first line that introduces a memory leak into the program?
Bingel [31]

Answer:

The description of the given code is given below:

Explanation:

Memory leak:

In a program, if memory is assigned to the pointer variables but that memory is already released previously then the condition of occurring the memory leakage.

Now the program :

#include <stdio.h>  //header file

#include <stdlib.h>  //header file

#include <string.h> //header file

int main()   //main function

{

char *word1 = NULL;   //line 1 (as given in the question)

word1 = malloc(sizeof(char) * 11);  //line 2

free(word1);  //free the memory of pointer word1  line 3

word1 = "bramble";   //line 4

char *word2 = NULL;   //line 5

word2 = malloc(sizeof(char) * 11);   //line 6

free(word2);  //free the memory of pointer word2  line 7

word2 = word1;   //line 8

return 0;   //line 9

}

Therefore, line 3 is the first line that introduce a memory leak anf after that line 7 introduce it in a program.

3 0
3 years ago
Given a int variable named yesCount and another int variable named noCount and a char variable named response, write the necessa
MariettaO [177]

// reading the value in response variable

cout<<"Enter the value :";

cin>>response;

// checking the value and printing the results

if(response == 'y' || response == 'Y')

{

yesCount+=1;

cout<<"YES WAS RECORDED";

}else if(response == 'n' || response == 'N')

{

noCount+=1;

cout<<"NO WAS RECORDED";

}else

cout<<INVALID";

5 0
3 years ago
You have answered 12 of 23 questions.
baherus [9]

Answer:

the answer is a network because the others are for different things

6 0
3 years ago
Other questions:
  • Given : an int variable k, an int array currentMembers that has been declared and initialized, an int variable nMembers that con
    8·1 answer
  • Explain the nature of documents that can be suitable for mergin
    12·1 answer
  • to create a cover letter to send to a potential employers along with a resume what software program should you use
    10·1 answer
  • What command launches the remote desktop client for windows?
    12·1 answer
  • Search the web to discover the 10 most common user-selected passwords, and store them in an array. Design a program that prompts
    7·1 answer
  • Consider a two-link network where Host A is connected to the router by a 1 Mbps link with 10 ms propagation delay and the router
    6·1 answer
  • Dividing a hard drive into multiple sections is known as partitioning
    5·1 answer
  • What are some areas in Computer Science that make use of multivariate statistical testing or MCM methods? Explain why they are u
    14·1 answer
  • Which of the statements is most likely true about the differences between the basic version and premium version of StreamPal
    9·2 answers
  • Identify the correct answer in each item. Write your answer on the blank provided before
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!