1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svet_ta [14]
3 years ago
13

Correct single error in this. Try to appear relaxed, but not to relaxed​

Computers and Technology
1 answer:
hoa [83]3 years ago
7 0

Try to appear relaxed, but not to relaxed .

You might be interested in
What are the 4-bit patterns used to represent each of the characters in the string "1301"? Only represent the characters between
Alla [95]

Explanation:

The string "1301" can be converted into numbers by using the ASCII characters set.

1. Decimal ASCII

1=49, 3=51, 0=48, 1=49

Without space

"1301" = 49 51 48 49

with space included

"1 3 0 1" = 49 32 51 32 48 32 49

(white space is represented by 32 in Decimal ASCII)

2. Hexadecimal ASCII

1=31, 3=33, 0=30, 1=31

Without space

"1301" = 31 33 30 31

with space included

"1 3 0 1"= 31 20 33 20 30 20 31

(white space is represented by 20 in hexadecimal ASCII)

The magnitude can be found by traditional decimal to binary conversion (Divide by 2 until we are left with remainder 0 or 1) and sign can be represented by adding most significant bit (MSB) 0 for positive and 1 for negative.

A. -27

Magnitude: 00011011

Since the sign is negative add 1 to the MSB

which becomes 100011011

B. 140

Magnitude: 10001100

Since the sign is positive add 0 to the MSB

which becomes 010001100

C. -99

Magnitude: 01100011

Since the sign is negative add 1 to the MSB

which becomes 101100011

D. 46

Magnitude: 00101110

Since the sign is positive add 0 to the MSB

which becomes 000101110

7 0
3 years ago
State and explain five misused of science and technology​
kap26 [50]

Answer:

Science and technology is the major key of life cycle.

Explanation:

Any five misused of science and technology are:-

•Guns and weapons to clash.

•Phishing sites

•Scamming online or on online shopping.

•Misusing social media and our phones.

•Crazy addictive online games.

6 0
3 years ago
If, in a recursive solution, function A calls function B which calls function C, this is called ________ recursion. indirect thr
suter [353]

If, in a recursive solution, function A calls function B which calls function C, this is called<u> Indirect</u> recursion.

A recursive algorithm is said to be recursive if such an algorithm calls itself with smaller input values and get current result for implementing basic operations on those simple inputs.

Indirect recursion occurs when a function A invokes another function B which in turn makes it the original function and calls another function C.

Learn more about recursion here:

brainly.com/question/3169485?referrer=searchResults

6 0
2 years ago
When you record a macro, you can assign it to run from a button or from the _____.
arsen [322]
Depends on what software you use and how you set it up. But yea it’s possible
3 0
4 years ago
Read 2 more answers
Jason had clicked an image of his favorite band at a concert. He wanted to create a washed out look of this image to turn it int
8_murik_8 [283]

just to ensure people, its desaturate (kinda like saturation)

4 0
4 years ago
Other questions:
  • An engineer is assigned the task of reducing the air pollutants being released from a power plant that generates electricity by
    9·1 answer
  • A senior center would like to add a new computer to their library so that members can check their email and read book reviews
    11·2 answers
  • While doing research on the Internet, what kind of website should you avoid because the information may be biased?
    11·1 answer
  • A two-dimensional array has been defined to hold the quantity of each of 5 different healthy snack products sold in a tuckshop d
    10·1 answer
  • What is the general term for programs used to operate a computer
    15·1 answer
  • What is an IF statement used for?
    12·1 answer
  • A small _____ at the lower right corner of a tool indicates that it contains hidden tools​
    13·2 answers
  • The following statements regarding centralized administration concepts are presented to you in an interview in which only one of
    5·1 answer
  • What equipment allows a computer to connect to the internet.
    13·1 answer
  • What effect have computers had on your life?​​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!