1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lorasvet [3.4K]
3 years ago
8

Advantages and disadvantages of screen reading​

Computers and Technology
1 answer:
Vikki [24]3 years ago
8 0

Explanation:

do u mean screen reading as in reading books in ur mobile ?

if so then disadvantage is the amount of eye strain u get staring into the screen

and advantage is the portability.

You might be interested in
Try making a character (string) variable and a logical variable . Try creating a variable with a "missing" value NA. You can cal
quester [9]

Answer:

The solution code is written in R script.

  1. #string variable
  2. character_str<- "Hello World"
  3. #logical variable
  4. logic <-  a > b
  5. #Missing value
  6. myVec <-c(1, 2, 3, NA)
  7. #Use class to check data type
  8. class(character_str)
  9. class(logic)
  10. class(myVec)

Explanation:

A string variable is a variable that hold a string (the letters enclosed within quotation marks) (Line 2)

A logical variable is a variable that hold a logical value (either True or False). The logical value is created by comparing two variables (Line 5).

In R, missing value is an unknown value which is represented by NA symbol (Line 8).  

We can use in-built method <em>class </em> to check for the variable type in R (Line 11-13). For example, the output of <em>class(character_str)</em> is "<em>character</em>"

8 0
3 years ago
You are reviewing the style sheet code written by a colleague and notice several rules that are enclosed between the /* and */ c
Flauer [41]

Answer:

Nothing will happen.

Explanation:

The rules written between /* and */ will be ignored because /* and */ are the standard way of writing comment in a style sheet code. So, whatever fall in between them will be ignored during rendering of the page.

7 0
3 years ago
Ways to ask for help effectively include
Step2247 [10]

Answer:

All of these choices

Explanation:

Clarity → the quality of being coherent and intelligible.

Sincerity → the quality of being free from pretense, deceit, or hypocrisy

Open mind → Open-mindedness is receptiveness to new ideas.

8 0
2 years ago
All of the following are characteristics of a 4 year college except
klasskru [66]
D they offer few programs
4 0
3 years ago
Read 2 more answers
Cascading style sheets (css) use special hypertext markup language (html) tags to globally define font characteristics for a var
ehidna [41]
The statement that Cascading style sheets (CSS) use special hypertext markup language (HTML) tags to globally define font characteristics for a variety of page elements as well as how those elements are laid out on a web page is true. <span> CSS is a stylesheet language used to describe the presentation of a document written in HTML or XML.</span>
5 0
3 years ago
Other questions:
  • Information systems security is the collection of activities that protect the information system and the data stored in it.
    12·1 answer
  • ​if a primary key combines two or more fields, then it is called a _____.
    14·1 answer
  • Displays are geared for a specific resolution. what is this resolution called?
    15·1 answer
  • Which of the following scenarios can best be addressed by operations management?
    11·1 answer
  • What type of network is capable of delivering voice, video streams, text, and graphics between many different types of devices o
    15·1 answer
  • What term is used to describe a shared database of domain users, groups, computers, resources, and other information, along with
    14·1 answer
  • Which operating system user interface does not reside on the computer but rather in the cloud on a web server?
    5·1 answer
  • If a filesystem has a block size of 4096 bytes, this means that a file comprised of only one byte will still use 4096 bytes of s
    12·1 answer
  • Why do attackers tend to target public or private Wi-fi networks?
    10·1 answer
  • Which is an example of a demand account
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!