1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vaselesa [24]
3 years ago
11

For questions 3-6, consider the following two-dimensional array:

Computers and Technology
2 answers:
elena-s [515]3 years ago
8 0

Answer:

5= Fabric

6=bandana

Explanation:

Nesterboy [21]3 years ago
5 0

Answer:

3. Will

4. Realize

5. Fabric

6. Bandana

You might be interested in
6. What are the two keyboard keys you can press at the same time to use the Copy command? (1.0 points)
Lapatulllka [165]

Answer:

CTRL and C

Explanation:

"press down the CTRL key with one finger and hold it down, then press the letter C with another finger, and then let both go"

6 0
3 years ago
In programming languages, ____ is used as a mnemonic representation for the program instruction’s memory address.
Alecsey [184]

Answer:

Assembly language

Explanation:

Assembly language writes instructions in human letters. Every machine language instruction has a corresponding assembly language instruction that means exactly the same thing. Assembly language uses a symbolic form of a program which are capable of:

- readable by human beings (+/-)

- constants, addresses, and names of symbolic instructions

- arithmetic during assembly - calculations of addresses, constants

- synthetic instructions (not supported by our assembler)

- expansion of macroinstructions (not supported by our

assembler)

- assembly instructions (pseudo-instructions)

• memory allocation

• memory initialization

• conditional assembly (not supported by our assembler)

3 0
3 years ago
A banker would like to present a spreadsheet as part of a presentation to potential clients. The spreadsheet makes use of severa
Alekssandra [29.7K]

Answer:

subtotal function

Explanation:

The Microsoft Excel SUBTOTAL returns the subtotal of the numbers in the columns in a list or database, and it can be applied horizontally as well as vertically. And the SUBTOTAL function happens to be the built-in function in Excel which is categorized as the Math function or the Trigger function. And like a worksheet function, it can be inserted as a part of the formula inside a cell of a worksheet. Select the columns in a row, or rows in a column, and move to the Data tab in the ribbon. From there,  select the SUBTOTAL, and the function you would like to use, and press ok. And this means here the correct option is the subtotal function.

6 0
3 years ago
#Write a function called hide_and_seek. The function should #have no parameters and return no value; instead, when #called, it s
Arlecino [84]

Answer:

# hide_and_seek function is defined

def hide_and_seek():

# for loop from 1 to 10

# and print each number

for number in range(1, 11):

print(number)

# the last message is displayed on its own line

print("Ready or not, here I come!")

# the function is called

hide_and_seek()

Explanation:

The code is well commented. A sample image of the output when the code is executed is attached.

7 0
3 years ago
Take the hypothetical situation that your business is considering a move to the cloud for core systems that contain confidential
zvonat [6]

Answer:

Solutions: to have a non-related to the company account and a back-up system.

Explanation:

My proposal is to move all the information of the bussiness to the cloud for better use of the data.

This data contains confidential health and finantial information and, in order to avoid any information non-wanted exit, the account has to be completing separated from the bussiness name  (more accounts),  by this way, it will be harder for extserns to get in it and substract the confidential information.

Also, the account must have a series of  security blocks to make it harder to  enter.

Finally, in case a virus gets in it and deletes any information, the data must have a backup system that will provide all the needed information in case it goes missing.

8 0
3 years ago
Other questions:
  • list the network characteristics of the wireless network(s) in the decode -- SSIDs, channels used, AP names, presence of Bluetoo
    6·1 answer
  • Technology offers a variety of rich opportunities available to teachers and students. According to Inan and Lowther (2010), ther
    6·1 answer
  • Universal Containers needs a field on the Account to track how many Opportunities are closing within the next 30 days. What can
    9·1 answer
  • What are the file sharing copyright laws in your area? Are they more strict or less strict than those in other areas of the worl
    9·1 answer
  • when you type a day, month, or date, what features does Word use to automatically complete typing the day, month, or date for yo
    6·1 answer
  • 1) List two hardware methods that can be used to secure data
    11·1 answer
  • The process of auditing the source code for an application to verify that the proper security controls are present, that they wo
    14·1 answer
  • While creating a digital portfolio, Harry wants to add documents that authenticate his skills, experience, and knowledge in digi
    11·1 answer
  • Gourmet pizza shop with a
    6·1 answer
  • Explain the role of computers in accounting
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!