1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrey2020 [161]
3 years ago
12

Identify problems created by using tables for website design. Check all of the boxes that apply.

Computers and Technology
1 answer:
meriva3 years ago
7 0

Answer:

Its A and D

Explanation:

I did it on edge 2020

You might be interested in
Using your computer for non-work activities while you are being paid to work is known as ________. Select one: A. cyber sleeping
Anvisha [2.4K]

Answer:

The correct answer for the given question is option(B) i.e cyberloafing.

Explanation:

Cyberloafing is defined as using the internet for non-work activities such as sending personal emails, chatting on social media sites etc during working .In this the employee using the internet for their personal use during working hours.

7 0
3 years ago
Read 2 more answers
Hey!! Can u help me please!!​
igor_vitrenko [27]

1. deletes file named school.txt

2 copy Aic.txt to windows

3. display the volume label and serial number if logical drive

4. remove directory named ASIAN

5.lists all files and sub directories of OS

6. displays current date and time

3 0
3 years ago
Read 2 more answers
un diagrama de flujo donde se gana una partida de ajedrez teniendo en cuenta los movimientos de la otra persona
mash [69]
Estoy tan confundido. ? estas haciendo una pregunta?

7 0
4 years ago
Describe the steps that transform a program written in a high-level language such as c into a representation that is directly ex
raketka [301]

Solution:

Firstly the instructions are parsed, one at a time, and each instruction is converted to the equivalent machine language (ML) binary CPU commands.  

The relative addresses are noted so that any jumps, loops, etc., can be updated to point to the correct (relative) address, and the binary codes representing the loop, jump, etc., will be replace with correct addresses.  

Thus, once all instructions are converted to ML instructions, and all addresses are replaced by the actual (relative) in-memory address, all the instructions are written (as actual binary) to an executable file along with loading instructions (in machine language), telling the CPU where to put the executable program in memory, and then the starting address of the program so the CPU will know where to actually find the program within the memory.


6 0
4 years ago
)what item is at the front of the list after these statements are executed?
White raven [17]

Answer:

Option (a) : sam

Explanation:

  • In the given program, the queue is defined in the first step.
  • The method addToFront() adds the given element to the front of the queue. After this step is executed the front element in the queue is that element.
  • The method addToBack() adds the given element to the back of the queue. After this step is executed the back element in the queue is that element.
  • After step 1, Jack is added to the front of the queue.
  • After step 2, Rudy is added to the back of the queue.
  • After step 3, Larry is added to the back of the queue.
  • After step 4, sam is added to the front of the queue.
  • After step 5, name contains Larry as the getBack() returns the element present at the back of the queue.
  • After step 6, Adam is added to the back of the queue.
  • After executing all of the steps now the queue contains "sam" as the front element of the queue.
  • So, the correct option is "sam".
3 0
3 years ago
Other questions:
  • Please help!
    10·1 answer
  • If you are going to attach more than 15 devices to your wireless network, you should make sure your router supports which standa
    14·1 answer
  • Identify the parts used in an electric circuit- Tiles
    9·2 answers
  • How would this requirement be implemented?
    12·1 answer
  • Cartoon Disney question: Snow White asks the dwarfs a question. 2 of them are lying and 3 can only say the truth. The continuati
    10·1 answer
  • ______ is the software that prevents people from being able to access your personal information.
    8·2 answers
  • Que es la papirofobia​
    13·2 answers
  • the following names are considered valid names for variable except for a. ST_Name b. ST name c. STName​
    9·1 answer
  • Question # 2
    6·1 answer
  • Select the correct answer from each drop-down menu. The following diagram shows four resistors. What is the effective resistance
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!