1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
denpristay [2]
3 years ago
9

A run is a sequence of adjacent repeated values. Write a

Computers and Technology
1 answer:
Roman55 [17]3 years ago
6 0

Answer: yeet

Explanation:

liker up

You might be interested in
Which of the following statements about the OSI is FALSE?A. The OSI model encourages modular design in networking.B. Each protoc
Afina-wow [57]

Answer:

The correct answer to the following question will be Option B.

Explanation:

<u>Open System interconnection:</u>

  • A practical and conceptual layout that describes network communication that will be used by the systems that are accessible to interconnection as well as other systems, is called the OSI model. This may also be referred to as the OSI model with seven layers.
  • The OSI model aims to direct developers and creators so that they would modularize with the wireless communication devices and computer programs they build, and to promote a consistent structure that defines the features of a network or telecom system.

Therefore, Option B is the right answer.

8 0
3 years ago
Tab stops are very useful when you want to A. align text into rows. B. add space between paragraphs. C. align text into columns.
Alenkasestr [34]
The best answer here is Answer C - Tab stops are useful when you want to "align text into columns".

All tab stops do is shift text a fixed amount to the left or right on the line. They are useful for improving the layout of text when you want to align multiple rows.

Answer A is incorrect because rows are vertical and not horizontal. B is also irrelevant because spaces between paragraphs are vertical. Answer D could also be correct because you can use tab stops to indent text aswell, but the more general answer is A. If you can have more than one answer, you could have A and D.
8 0
3 years ago
Read 2 more answers
You are given two processors P1 and P2 that execute the same instruction set but have different architectures. The instructions
mafiozo [28]

The answer & explanation for this question is given in the attachment below.

3 0
3 years ago
When LDAP traffic is made secure by using Secure Sockets Layer (SSL) or Transport Layer Security (TLS), what is this process cal
Simora [160]

Answer:

Authorization is granting permission for admittance. ACLs provide file system security for protecting files managed by the user. Rule-Based Access Control can be changed by users.

Explanation:

8 0
2 years ago
Which of the following are vector graphic file formats? Choose all that apply.
blondinia [14]

There are different kinds of files. The option that is a vector graphic file formats is SVG.

<h3>What are vector files?</h3>

Vector files are known to be a type of images that are created by using mathematical formulas that stands as points on a grid.

The SVG  is known as Scalable Vector Graphics file and it is known to be a  vector image file format as it make use of geometric forms such as points, lines, etc.

Learn more about vector graphic file from

brainly.com/question/26960102

3 0
2 years ago
Other questions:
  • Bob's Assembly is a hardware manufacturer. It specializes in builders' hardware for doors, cabinets, windows, and bathrooms. Bob
    10·1 answer
  • What is a Photojournalist
    5·1 answer
  • Discuss advantages and disadvantages of Twisted Pair?
    6·1 answer
  • What are three ways you cite evedince
    5·2 answers
  • I know how to design it but I’m confused as to how to write a function code based on the info provided.
    10·1 answer
  • Why is the ketboard calledQWERTY
    11·2 answers
  • Which type of network involves buildings in multiple cities connecting to each other?
    8·1 answer
  • An if statement must always begin with the word “if.” True False python
    15·2 answers
  • Which of the following online creation tools will be used if a person wants to create a video presentation?
    8·1 answer
  • Maria is conducting a security investigation and has identified a suspect. The suspect is an employee of the organization who ha
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!