1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ipn [44]
3 years ago
10

When can screen tips be useful

Computers and Technology
2 answers:
Vikki [24]3 years ago
6 0
Whenever honestly , what subject is this for?
grin007 [14]3 years ago
6 0
When you do not know what or how a command functions.
You might be interested in
Which of the following loop conditions will read all the data in the file assuming that each line in the file contains two integ
PSYCHO15rus [73]

Answer:

while(inFile >> intOne >> intTwo)

Explanation:

Options are missing but the line of code that does the illustration in the question is while(inFile >> intOne >> intTwo)

Considering two variables, intOne and intTwo

Suppose that a file location has been specified, the infile statement identifies file which could either be an external data or an in-stream data from which data should be read.

while(inFile >> intOne >> intTwo)

Declares a while loop, with the help of the inFile statement, values in the first column are entered into intOne while the second column are entered into intTwo through with the help of then input channel symbol (>>).

3 0
3 years ago
How do you find specific words on a web page ...?? I know theres a shortcut for highlighting a specific word on a webpage on fir
aniked [119]
If you are on a desktop computer you can press the top row key "F3" and a little box will pop up and you can type the word you are looking for in there and it will find that word on the page you are on and take you straight to it.
5 0
3 years ago
What technology has a function of using trusted third-party protocols to issue credentials that are accepted as an authoritative
jarptica [38.1K]

Answer: PKI certificates

Explanation: PKI is known as the public key infrastructure which is commonly used for the encryption of the data and also for the data signing. They have the ability to assign the keys pair.

PKI certificates are in the form of strings of alpha-numeric running for a mathematical functions. They use the third party protocols for the execution and they are widely accepted by the authoritative identity.

5 0
3 years ago
PLEASEEEEE HELLPPP IT'S URGENT!!! PLEASEEEEE HELLPPP IT'S URGENT!!!
kogti [31]

Answer:

LED matrix is a grid of lights arranged into rows and columns

A battery is a device consisting of one or more electrochemical cells with external connections for powering electrical devices such as flashlights, mobile phones, and electric cars.

A processor is a machine that processes something.

An accelerometer is a tool that measures proper acceleration.

Universal Serial Bus is an industry standard that establishes specifications for cables and connectors and protocols for connection, communication and power

A compas is an instrument containing a magnetized pointer which shows the direction of magnetic north and bearings from it.

A block editor allows you to add Columns block, which basically adds two columns of paragraph blocks.

Iteration is the repetition of a process in order to generate an outcome.

Selection is the action or fact of carefully choosing someone or something as being the best or most suitable.

Algorithm is a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.

debug identifies and remove errors from (computer hardware or software).

an arithmetical value, expressed by a word, symbol, or figure, representing a particular quantity and used in counting and making calculations and for showing order in a series or for identification.

I can do the rest if you want, just wanted to give you a head start :)

8 0
3 years ago
HTML is the authoring language developed to create web pages and define structure and layout of a web document
Eduardwww [97]

Answer:

true

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • What happens when the computer is thrashing? quizzlet?
    12·1 answer
  • Principles of defensive driving include:
    15·1 answer
  • You have no control over who views your social network information
    13·2 answers
  • Which of the following is true? A)Checks and Debit Cards both withdraw money directly from a bank account. B)Checks are the most
    13·2 answers
  • HURRY UP !!!!!!’<br> Each packet is addressed to the recipient's .
    8·1 answer
  • Lenovo's ThinkPad laptop computers is designed in the United States, the case, keyboard, and hard drive are made in Thailand; th
    14·1 answer
  • Which of the following is a key feature of SmoothWall? Weak traffic graphs and bandwidth bars Universal Plug and Play support DM
    7·1 answer
  • Which of the following is an example of an output device
    13·1 answer
  • How much is this worth in dollars​
    9·1 answer
  • marianne needs to create a version of her slide presentation that does not include all the slides and will be used for a particu
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!