1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Damm [24]
3 years ago
13

Can someone tell me which key is the num lock

Computers and Technology
1 answer:
Klio2033 [76]3 years ago
6 0
I don’t understand what u mean can u explain so i can help
You might be interested in
A commonly used font style is _____. superscript periwinkle times new roman point
ANEK [815]
Times New Roman is a more commonly used font style, I believe.
5 0
3 years ago
WOULD SOMEONE PLEASE ANSWER THIS IVE ASKED TWICE ALREADY!
Rainbow [258]
I think that’s right, hope it helps!:) brainliest??

7 0
3 years ago
The value of a variable can change multiple times during the execution of a computer program.
ratelena [41]

Answer:

a. True

Explanation:

6 0
2 years ago
Suppose a computer has 16-bit instructions. The instruction set consists of 32 different operations. All instructions have an op
Kazeer [188]

Answer:

2^7= 128

Explanation:

An instruction format characterizes the diverse part of a guidance. The fundamental segments of an instruction are opcode and operands. Here are the various terms identified with guidance design:  Instruction set size tells the absolute number of guidelines characterized in the processor.  Opcode size is the quantity of bits involved by the opcode which is determined by taking log of guidance set size.  Operand size is the quantity of bits involved by the operand.  Guidance size is determined as total of bits involved by opcode and operands.

6 0
4 years ago
The __________ level focuses on developing the ability and vision to perform complex, multidisciplinary activities and the skill
Alex73 [517]

Answer:

Education and experience

Explanation:The Education and experience level of a particular person is a major determinant factor in Information technology.

An Information Security professional is a person who has adequate knowledge and capabilities to implement strategies, systems and techniques in place in order to achieve safety in the use of information technology. Most organisations make the Education and experience of the professional to be of interest when recruiting for an IT position.

6 0
3 years ago
Other questions:
  • 5. Write a function that takes two lists of integers and returns a list containing tuples with corresponding elements from both
    8·1 answer
  • )In a graph represented by adjacency matrix u can find all the neighbours of a given vertices in ____Operations
    6·1 answer
  • What does place value mean with binary?
    6·1 answer
  • A Cisco Catalyst switch has been added to support the use of multiple VLANs as part of an enterprise network. The network techni
    5·1 answer
  • What is the initial page of the website​
    9·1 answer
  • What other jobs would require employees to follow directions very carefully? (Give 4 examples)​
    9·1 answer
  • A(n) ___ is a set of CPUs which work in parallel in an attempt to simulate the way the human brain works, although in greatly si
    5·1 answer
  • A new thread begins its life cycle by transitioning to the ________ state. Group of answer choices new runnable waiting terminat
    9·1 answer
  • How to resize an image in photoshop without losing quality.
    11·1 answer
  • What electronic devices do you use more frequently? And how much time do you use them?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!