1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arisa [49]
2 years ago
12

Write a police description a person who know you well​

Computers and Technology
1 answer:
SIZIF [17.4K]2 years ago
3 0

Answer:

I will be describing Jude. He is a neighbor.

Explanation:

A police description refers to the method of describing a person using high-level detailing. An example is given below:

  1. He is a Five feet-three male caucasian
  2. With brown eyes and
  3. an Australian accent
  4. He has a military haircut
  5. About 38 years
  6. Weighs about 95Kg
  7. and dresses casually
  8. he walks with a slant to the left
  9. a dove tattoed at the back of his neck
  10. and a birthmark on his left ear lobe

Cheers

You might be interested in
It's a holiday poop in my bitt
Zina [86]

Answer:

bitt

Explanation:

pp

4 0
2 years ago
Read 2 more answers
To have a set of command
GalinKa [24]

Every program that interacts with people responds to a specific set of commands. The set of commands and the syntax for entering them is called the user interface and varies from one program to another. The DOS operating system makes a distinction between internal and external commands.

3 0
2 years ago
If a device does not require a driver, it is _____.
xxTIMURxx [149]

Answer:

(B) plug and play

Explanation:

If a device does not require a driver, it is <u>plug and play</u>. Plug and Play (PnP) is a combination of hardware and software support that enables a computer system to recognize and adapt to hardware configuration changes with little or no intervention by a user, including the loading of appropriate drivers.

7 0
3 years ago
Why is a memory hierarchy of different memory types used instead of only one kind of memory?
Kipish [7]

Answer: Memory hierarchy is the hierarchy that is created on the basis of the response time of different memories. The performance obtained by the memory helps in creating a computer storage space in distinguished form. The factors considered for the creating of the hierarchy structure are usually response time, storage capacity, complexity etc.

Usage of different kind of memories take place due to different kind of requirements from the system which cannot be fulfilled using one memory device.The requirement is based on saving time, decreasing complexity , improving performance etc.Example of requirements can be like some functions and files do not require much space , some might require quick accessing,etc.

Thus hierarchy of any particular system is in the form of fast to slow order from registers,cache memory, Random access memory(RAM) and secondary memory.

5 0
3 years ago
If Number = 7, what will be displayed after code corresponding to the following pseudocode is run? (In the answer options, new l
kherson [118]

Answer:

5,10; 6,12; 7,14

Explanation:

We will demonstrate the iteration of the loop:

First iteration: Number = 7, Count = 5 at the beginning. We will check if Count <= Number? Since it is correct, prints 5,10. Increment the Count by 1.

Second iteration: Number = 7, Count = 6. We will check if Count <= Number? Since it is correct, prints 6,12. Increment the Count by 1.

Third iteration: Number = 7, Count = 7. We will check if Count <= Number? Since it is correct, prints 7,14. Increment the Count by 1.

Forth iteration: Number = 7, Count = 8. We will check if Count <= Number? Since it is not correct, the loop stops.

8 0
3 years ago
Other questions:
  • Write a complete program to read two integers and display the number of integers that lie between them, including the integers t
    12·1 answer
  • Ou have just set up a network that will use the tcp/ip protocol, and you want client computers to obtain ip configuration automa
    9·1 answer
  • A(n) monitoring vulnerability scanner is one that listens in on the network and determines vulnerable versions of both server an
    7·1 answer
  • Laura wants to know more about the organization to which she has applied. What can she do to know more about the organization’s
    12·1 answer
  • Write a function called show_info that takes a name, a home city, and a home state (a total of 3 arguments) and returns a full s
    12·1 answer
  • Edie wants to visit her university's website. What software application should she use?
    9·2 answers
  • What should be included in research for a problem statement? Select all that apply
    13·2 answers
  • What layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at t
    12·1 answer
  • Clarice is an architect who is involved in design work on a restaurant in a building that used to be part of the city’s water wo
    8·1 answer
  • In Java, Create a two part program. The first takes a user inputted number and lists the factors. The second, lists all the prim
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!