1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irinina [24]
3 years ago
10

Explain paragraph layout

Computers and Technology
1 answer:
S_A_V [24]3 years ago
3 0

Answer:

introduction, body, resolution/conclusion.

You might be interested in
You are able to drag a cell to a new location by pointing to the cell border until the pointer displays a _______ arrow, and the
ivann1987 [24]
I think its D, double-headed if I remember right. If this is brainiest can you mark it, please! I am trying to rank up. Thanks, hun!
7 0
3 years ago
Read 2 more answers
2) Phát biểu nào sau đây là sai khi gán hiệu ứng cho các đối tượng trên slide?
raketka [301]
Pls translate into english
8 0
3 years ago
What is a well-planned strategy that ensures the search and navigation functions are easy to use and user-friendly on a website?
snow_tiger [21]

Answer:

The correct answer to the following question will be "Taxonomy ".

Explanation:

A location taxonomy seems to be the direction it helped organize the information into subgroups as well as subsections, often shown in a network map, in comparison to internet sites and access points.

  • Is a very well-planned approach that implies that somehow the navigation features on the website become straightforward to do this and feature-packed
  • The scientific method of categorizing, or classifying, items predicated on a default framework.
6 0
3 years ago
From the binary search algorithm, it follows that every iteration of the while loop cuts the size of the search list by half.
Colt1911 [192]

Answer:

True: In binary search algorithm, we follow the below steps sequentially:

Input: A sorted array  B[1,2,...n] of n items and one item x to be searched.

Output: The index of x in B if exists in B, 0 otherwise.

  1. low=1
  2. high=n
  3. while( low < high )
  4.  {      mid=low + (high-low)/2
  5.         if( B[mid]==x)
  6.          {
  7.             return(mid)  //returns mid as the index of x
  8.           }
  9.          else
  10.          {
  11.              if( B[mid] < x)      //takes only right half of the array
  12.               {
  13.                 low=mid+1
  14.               }
  15.              else               // takes only the left half of the array
  16.               {
  17.                high=mid-1
  18.               }
  19.           }
  20.  }
  21. return( 0 )

Explanation:

For each iteration the line number 11 or line number 15 will be executed.

Both lines, cut the array size to half of it and takes as the input for next iteration.

6 0
4 years ago
Why is the middle portion of 3des a decryption rather than an encryption?
Rainbow [258]

Answer:

There is no cryptographic significance to the use of decryption for the second stage. Its only advantage is that it allows users of 3DES to decrypt data encrypted by users of the older single DES by repeating the key.

6 0
2 years ago
Other questions:
  • Adam, a college student, downloads a document containing resume templates from the Internet. When he opens the document
    13·1 answer
  • PLEASE HELP ME ASAP ;(
    15·1 answer
  • You're the network administrator for a company that has just expanded from one floor to two floors of a large building, and the
    13·1 answer
  • You receive a check on which the numerical dollar amount does not match the dollar amount written in words.
    14·1 answer
  • Janet has created a 3D movie. She wants to make a copy of the movie and store it for future use. Which device should she use?
    14·1 answer
  • Concept about borderless classroom because of technology​
    9·1 answer
  • Software project management is the process planning, organizing, and monitoring of the development of a software project from it
    15·1 answer
  • ANo _____ works by using the Internet to relay communications; it maintains privacy through security procedures and tunneling pr
    12·1 answer
  • Consider the following declaration: (1, 2) double currentBalance[91]; In this declaration, identify the following: a. The array
    14·1 answer
  • What does it mean when it says this person is unavailable on messenger.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!