1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tatuchka [14]
3 years ago
12

Ballet was originally created for the wedding celebration of Louis XVI and Marie Antoinette. (True or False)

Computers and Technology
2 answers:
klemol [59]3 years ago
7 0

Answer:

True

Explanation:

erastova [34]3 years ago
3 0

Answer:

true

Explanation:

You might be interested in
______ data is data that has not been processed for use. Multiple choice question. Raw Fast Decision Source
Illusion [34]

Answer: Raw Data

Explanation:

Raw data (sometimes called source data, atomic data or primary data) is data that has not been processed for use.

6 0
2 years ago
A. Assume a computer has a physical memory organized into 64-bit words. Give the word address and offset within the word for eac
Galina-37 [17]

Answer:

Check the explanation

Explanation:

For 9th byte , it is from 8*8 bit to 9"8th bit so each word consists of 64 bits , to find word address u have to divide 8*8 by 64.

Offset within word = 9*8modulo 64.

For 27th byte , word address = 8*27/64.

Offset within word = 27* 8 modulo 64

For 21th byte , word address = 8*31/64

Offset within the word = 31*8 modulo 64

For 120 , word address = 8*120/64

Offset within the word = 120*8 modulo 64.

7 0
3 years ago
Which security procedure is being demonstrated if an administrator is using Wireshark to watch for specific inbound and outbound
defon

Answer:

The correct answer to the following question will be Option C (Firewall monitoring).

Explanation:

Firewall monitoring would be the analysis of essential firewall parameters that play a key role throughout the effective operation of firewalls.

Usually, management of the firewalls should include:

  • Monitoring the firewall file.
  • Management of the firewall statute.
  • Monitoring the design of the firewall.

Firewall security control is shown if the user uses Wire-shark to track relevant incoming and outgoing traffic.

Therefore, Option C is the right answer.

4 0
3 years ago
Demonstrate how to assign a value to the third element of an array called finalGradeArray.
scoundrel [369]

Answer:

It's really important that you say in which language you wanna do this. But like in python:

finalGradeArray.insert(2, "New value")

Explanation:

8 0
3 years ago
Which of the following involved a digital designer? The hardware that lets your hard drive work. A computer animated movie An ol
sergejj [24]

Answer: An old cartoon from the 1930's! :)

4 0
3 years ago
Other questions:
  • When Aaron was called for an interview at a graphic designing company, his first interview test assessed his creativity and his
    7·2 answers
  • Data mining is ______? a process of finding meaningful patterns in data to improve decisions a strategy for locating security so
    7·1 answer
  • Use a one-dimensional array to solve the following problem: A company pays its salespeople on a commission basis. The salespeopl
    6·1 answer
  • 30
    5·1 answer
  • Indicate the proper order (1-4) of the following PR strategic planning 4-step process. 1 Defining the problem 2 Evaluating the p
    10·1 answer
  • Question 5 (10 points)
    12·1 answer
  • When discussing the data-modeling building blocks, anything (a person, a place, a thing, or an event) about which data are to be
    15·1 answer
  • Port explorers ​are tools used by both attackers and defenders to identify (or fingerprint) the computers that are active on a
    6·1 answer
  • How to write an algorithm to read and print a name?<br> I want the steps please
    9·1 answer
  • What is the role of computer in education sector?​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!