1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tangare [24]
3 years ago
5

The list of abbreviations, punctuation, symbols, typefaces, and instructional notes that appears at the beginning of the ICD and

provides guidelines for using the code set are called ________.
Computers and Technology
1 answer:
Ilia_Sergeevich [38]3 years ago
4 0

Answer: Conventions

Explanation: Convention is the writing activity with the components like punctuation,grammar,symbols,note etc to make the written content understandable and clear. This feature is used because people can understand the meaning of content read by them without initializing it later.

As soon as the reader finishing the reading the information should be clear in his/her mind so that they don't have to figure it out after reading.Convention enhances the value of reading and learning by it's feature .

You might be interested in
Consider the following method, which is intended to return the number of local maximum values in an array Local maximum values a
Setler79 [48]

Answer:

Replace the comment with:

int p = 1; p < data.length - 1; p++

Explanation:

See attachment for proper format of the code

The loop header is expected to test if the current element is greater than the adjacent elements (i.e. array elements before and after it)

It should be noted that the first element of the array (index 0) has not element before it and the last element of the array has no element after it.

So, the loop header must start from index 1 and end at the last index - 1

The option that illustrates this is:

int p = 1; p < data.length - 1; p++

4 0
3 years ago
In the Dread Pirate Roberts case, U.S. Ulbricht, 31 F. Supp. 3D 54D (S.D.N.Y. 2014), one of the issues that the court addressed
LUCKY_DIMON [66]

Answer:

True.

Explanation:

One of the problems described by that of the court through the Dread Pirate Roberts case was about whether Bitcoin was currency of cash-laundering laws reasons. The following court decided in the following scenario that somebody might breach the money-laundering law through using bitcoin.

So, the following scenario is true about the case of Dread Pirate Roberts.

6 0
3 years ago
In your opinion, why did Proponents<br>of IPs used IPV6 instead of IPv5​
frutty [35]

Answer:

The following where many reasons why IPv6 was used instead of IPv5 which are the limitation of it's 32 bit address, IPv5 began or used with a different name called Internet streaming, IPv6 provides unlimited addressing, because it comprises of 128 bit.

Explanation:

Solution:

The following reasons why Proponents  of IPs used IPV6 instead of IPv5​ is stated as follows:

  • Due to its limited 32 bit addressing
  • IPv6 offers almost unlimited addressing because of its 128-bit addressing
  • IPv5 started under a different name which is internet stream(ST)
  • ST(Internet streaming) was developed for streaming video and voice
  • ST was developed by Apple, NeXT, and Sun Microsystems
  • ST was effective on specific frequency to carry out communication
5 0
3 years ago
What comes to mind when you see/hear QWERTY?
Rom4ik [11]
They are the top-row left hand keys on a keyboard.

Hope this helps,

kwrob
7 0
3 years ago
Read 2 more answers
Computer-aided design software is used by ________.
koban [17]

Answer:

by Architects?

Explanation:

not sure

6 0
3 years ago
Other questions:
  • If people have humility, they don’t tend to see themselves as overly or more important than others. True False
    13·1 answer
  • Write a function so that the main() code below can be replaced by the simpler code that calls function MphAndMinutesToMiles(). O
    5·1 answer
  • Write a sentinel-controlled while loop that accumulates a set of integer test scores input by the user until negative 99 is ente
    8·1 answer
  • TRUE OR FALSE!!!!!
    6·2 answers
  • Which document contains the dod cyber regulations for cui and cti??
    12·1 answer
  • Programmers refer to programs that contain meaningful names as ____. AnswerThe answer is: Programmers refer to programs that con
    12·1 answer
  • If you’re the victim of cyber bullying behavior, besides contacting your teacher or the school, where else can you go to find in
    13·1 answer
  • When you need to move data over long distances using the internet, for instance across countries or continents to your amazon s3
    5·2 answers
  • Helllllllllppppppppppp
    9·1 answer
  • What is the role of UPS in Computer security?<br>4 marks answer​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!