1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nadya68 [22]
3 years ago
9

Floating point numbers?

Computers and Technology
1 answer:
blondinia [14]3 years ago
4 0

Answer:

Thank you so much!!!

God bless you!!!

You the best!!!

Explanation:

You might be interested in
A university with remote campuses, which all use different service providers, loses Internet connectivity across all locations.
Anastaziya [24]

Answer:

A & D.

Explanation:

In real time operating system, the best description for this type of attack explained in the question is;

DOS and Race Condition.

Because race condition takes place when 2 or more threads are able to both access and change shared data simultaneously ,while DOS is a good foundation to build a custom made Real time operating system.

Thus, options A & D are correct.

5 0
3 years ago
Which option can Jesse use to customize her company’s logo, name, address, and similar details in all her business documents?
Rasek [7]
Are you talking about word processors? If yes, you can edit a document's header and footer so the change reflects on all pages of the document.
3 0
3 years ago
A state in which two things are able to exist or occur together without problems or conflict...
VladimirAG [237]

Answer:

Compatibility

Explanation:

that's the definition of compatibility.

4 0
3 years ago
Is this statement true or false? you can change the color of the value of a cell or the background color of the cell, but not bo
zmey [24]

Answer:

false

Explanation:

3 0
2 years ago
List five function key<br> list two alphabet key<br>byEmmanuel okorie​
Tanya [424]

Explanation:

Function keys:F1,F2,F3,F4

Alphabetic keys H,A

5 0
3 years ago
Other questions:
  • The system tray contains _____.
    7·2 answers
  • identify three of the many shared ethical standards among businesses that are incorporated in codes of ethics
    6·2 answers
  • The index number of a combobox object can be assigned to a(n) ____ data type variable
    13·1 answer
  • How do i download my music from my computer to google play?
    14·1 answer
  • Five features of any window​
    14·1 answer
  • Henry created a software that manages all of his music. He wishes to run software on another computer system that runs an operat
    8·1 answer
  • Useful open source applications include the popular Web browser Mozilla Firefox, the e-mail application Thunderbird, the relatio
    7·2 answers
  • Match the example with the type of collection.
    15·1 answer
  • 2. 25 POINTS!!!!!!!!!
    8·2 answers
  • _________ is the method used by password crackers who work with pre-calculated hashes of all passwords possible within a certain
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!