1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jenyasd209 [6]
3 years ago
6

Is the jane austen pride and prejudie a primary source

Computers and Technology
1 answer:
Kryger [21]3 years ago
6 0

Answer:

Explanation:

Jane Austen's Pride and Prejudice: The Novel as Historical Source. ... Using a novel as a "primary" source—a way to learn about social history, students can gain valuable insights.

You might be interested in
Consider a multidimensional array A stored in row-major order with 22 rows and 6 columns whose subscripts start at 0. If each el
siniylev [52]

Answer:

Option c is the correct answer for the above question.

Explanation:

  • If the array will store in row-major order, then it will be a store like the first row, then second row and then third row.
  • If the user wants to conclude the address of the A[3,5], then the address of the A[3,5] will be 184.
  • It is because the 3 states the row number and the 5 states the column number.
  • The above question states that every value take 8 bit. and there are 4 rows from 0 to 3 and 6 column (0 to 5) for every row (except the fourth rows because it takes 5 columns from 0 to 4) before the A[3,5].
  • So there are 23 value before A[3,5] which are as-- [00,01,02,03,04,05][10,11,12,13,14,15][20,21,22,23,24,25][30,31,32,33,34].
  • So when every value takes 8 bit then 23 value takes 184 bits(23*8).
  • So the address of A[3,4] is 184.
  • Hence option c is the correct and the other is not because of 184 stated from the c option only.
4 0
3 years ago
2 negative impact of excessive use of computer even in solving mathematical problem.
zlopas [31]

Answer:

Computers are now a days the very important part of each department as well as homes. All people are somehow using computers for their respective needs. As technology always has the negative impacts along with the positive ones so, computer do have some crucial points when taking about students specially.

Following are listed some acts that add to the negativity of computer's usage.

  • Excess use of computers by students while solving mathematical problems lead them to rely totally on the computer. Students don't tend to calculate by their own instead they use computerized calculators for their ease and hence they start lacking even in basic calculations in normal routine also.
  • Computers may impact students routine in such a way that they don't concentrate on their studies while having extreme interest in video games and their favorite seasons and other activities.
  • Using computers more than a certain limit effects eyesight badly. This is the reason today most of the teenagers use spectacles in normal routine.

<h3>I hope it will help you! </h3>
4 0
3 years ago
Aria has modified the hard disk that hosts the operating system by using the fdisk command. The fdisk command indicates that the
Neko [114]

Answer:

A. Run the parted command.

D. Reboot the system.

Explanation:

Linux command line shell is a vital tooling server administration. It provides the flexibility of executing user and kernel mode commands on the command line interface.

Unlike graphic user interface operating systems, it receives typed commands on its prompt to execute tasks. The fdisk command shows the newly created partition on a disk, and to reload, the parted command is executed or the system should be rebooted.

3 0
3 years ago
Where do today's computers store almost all motherboard configuration data?
sergij07 [2.7K]
In the mother board of the back door next to the restroom 5 steps left
3 0
3 years ago
U
beks73 [17]
8wmX si2 jkkajmid di e2 2i2
3 0
3 years ago
Other questions:
  • you were discussing software privacy with a friend were surprised to learn how software privacy can impact your life everyday. w
    10·1 answer
  • What is the IEEE standard for the Wi-Fi Protected Access 2 (WPA2) security protocol?
    6·1 answer
  • In Microsoft Word, when you highlight existing text you want to replace, you are in what
    11·1 answer
  • What should a career plan include?
    7·1 answer
  • It will gain you more knowledge, intensify your soft skills, strong work ethics and grow your network. What is it?​
    12·2 answers
  • Suppose that f() is a function with a prototype like this: void f(________ head_ptr); // Precondition: head_ptr is a head pointe
    15·1 answer
  • Why is population composition by age important give reason​
    13·1 answer
  • I prefer a job where I am praise for good performance or I am accountable for results
    13·1 answer
  • Additional metadata data is stored alongside the binary colour values for each pixel. Give two examples of metadata?
    9·1 answer
  • Insertion point shows where the typed text will appear.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!