1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tekilochka [14]
3 years ago
6

fill in the balenkes ) 1)there are ................................... function keys on the keybord 2)pressing the end key moves

the coursor to the ......................................... charecter of line​
Computers and Technology
1 answer:
Doss [256]3 years ago
6 0

Answer:

1.) There are 12 function keys 2.) The return Key

Explanation:

You might be interested in
How can the two independent clauses below be combined to form a correct complete sentence? Check all that apply.
stepladder [879]
Jonas has homework that isn’t finished.
3 0
2 years ago
6. Find the volume of the figure. Round your answers to the nearest
myrzilka [38]

Answer:

V=314.15\ ft^3

Explanation:

The attached figure shows the cone.

Radius of cone, r = 5 ft

Height of the cone, h = 12 ft

We need to find the volume of the figure. The volume of a cone is given by :

V=\dfrac{1}{3}\pi r^2 h\\\\V=\dfrac{1}{3}\pi \times 5^2 \times 12\\\\V=314.15\ ft^3

So, the volume of the figure is 314.15\ ft^3.

5 0
3 years ago
Find the area of the regular hexagon below by using the area formula for triangles.
mojhsa [17]
I think the answer is B. Because if you multiply 6x8 it’s 48 divided by 2 equals 24
5 0
3 years ago
Fill in this function that takes three parameters, two Strings and an int. 4- // Write some test function calls here! The String
zimovet [89]

Answer:

The function in Java is as follows:

public static void printMessage(String lineOne, String lineTwo, int lines){

       for(int i = 1;i<=lines;i++){

           if(i%2 == 1){

               System.out.println(lineOne);

           }

           else{

               System.out.println(lineTwo);

           }

       }

   }

Explanation:

This defines the function

public static void printMessage(String lineOne, String lineTwo, int lines){

This iterates through the number of lines

       for(int i = 1;i<=lines;i++){

String lineOne is printed on odd lines i.e. 1,3,5....

      if(i%2 == 1){

               System.out.println(lineOne);

           }

String lineTwo is printed on even lines i.e. 2,4,6....

           else{

               System.out.println(lineTwo);

           }

       }

   }

To call the function from main, use:

printMessage("Hi", "Karel", 5);

8 0
3 years ago
What class of attacks use innovative attack tools and once a system is infected it silently extracts data over an extended perio
KatRina [158]

Answer:

Advanced persistent threat.

Explanation:

Advanced persistent threat is a threat actor implemented by either a government supported or private group to intrude a network or system and stays undetected, collecting information over a period of time.

It is used by cyber terrorist group to facilitate massive attacks based on the information retrieved. National or government group use the concept to promote national security.

7 0
3 years ago
Other questions:
  • Ciscon Telecom is a mobile operator in the European Union. The company provides personalized services to its customers, and its
    8·2 answers
  • Ohanians “great big secret” is that:
    8·1 answer
  • What is motivation and state the two forms​
    14·1 answer
  • Why is science, mathematics, and technology different from engineering?
    15·1 answer
  • How to shutdow computer
    7·1 answer
  • How did the military in the early 1900s move resources?
    7·1 answer
  • Describe how data is transmitted using half-duplex serial data transmission.
    9·1 answer
  • You are an IT network administrator at XYZ Limited. Your company has critical applications running of its Ubuntu Linux server. C
    6·1 answer
  • Differentiate between perfect and imperfect market​
    14·1 answer
  • What service determines which resources a user can access along with the operations that a user can perform?.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!