1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vikentia [17]
3 years ago
14

FREE BRAINLIEST!!!

Computers and Technology
2 answers:
BartSMP [9]3 years ago
5 0

Answer:  

When recording a macro, the cursor will look like a cassette tape to indicate it is recording. This answer has been confirmed as correct and helpful.  

Explanation:

the correct answer is D

Nastasia [14]3 years ago
4 0

Answer:

B

Explanation:

You might be interested in
Who created identity theft ? & what is the content of it
sergij07 [2.7K]

Answer:

The term identity theft was coined in 1964

Explanation:

5 0
4 years ago
Parts are described by partnum, color, and price. Parts can be subassemblies as well and this means that they contain other part
sladkih [1.3K]

Answer:

Attached is the solution:

5 0
3 years ago
For things like school, you should have a more serious:
german

Answer:

who and what do you mean

Explanation:

7 0
3 years ago
You are working as a Software Programmer for one of the big retail company. You need to implement the program that can store at
Aleks [24]

Answer:

The C++ code is given below with appropriate comments. Random names of customer information are chosen as samples

Explanation:

#include <iostream>

using namespace std;

int main()

{

// Initialize String Arrays for customerName,customerAddress1,city,state,zip for 15 customers

string customerName[15] = {"Liam","Noah","William","James","Logan","Benj","Mason","Elijah","John","Patty","Cheryl","Nick","Brian","Steve","mark"};

string customerAddress1[15] = {"Liam - Address1","Noah - Address2","William - Address3","James - Address4","Logan - Address5","Benjamin - Address6","Mason - Address7","Elijah - Address8","John - Address9","Patty - Address10","Cheryl - Address11","Nick - Address12","Brian - Address13","Steve - Address14","mark - Address15"};

string city[15] = {"Sitka","Juneau","Wrangell","Anchorage","Jacksonville","Anaconda","Oklahoma City","Fort Worth","Dallas","Sitka","Juneau","Wrangell","Anchorage","Jacksonville","Anaconda"};

string state[15] = {"Alaska","Alaska","Alaska","Alaska","Florida","Montana","Montana","Oklahoma","Texas","Arizona","Tennessee","California","Virginia","Indiana","Virginia"};

int zip[15] = {30041,36602,75062,78952,12071,55874,11236,44512,55262,99874,11020,55820,11304,11587,11047};

// Print Zips for the customers

cout <<"Customer Names"<<"\t"<< "Zip Code"<< "\n";

for (int i = 0; i < 15; i++)

cout <<customerName[i]<<"\t\t\t"<< zip[i] << "\n";

}

5 0
3 years ago
Which of the following statements is true regarding how Wireshark works? a. Where packets are captured and how they are captured
I am Lyosha [343]

Answer:

b. By running the Wireshark software on the same computer that generates the packets, the capture is specific to that machine.

Explanation:

By running the Wireshark software on the same computer that generates the packets, the capture is specific to that machine. is true regarding how Wireshark works.

4 0
3 years ago
Other questions:
  • In the FEMA case study, the BureauNet software was the primary reason behind the increased speed and relevance of the reports FE
    15·2 answers
  • What are the possible sources of the information that defines the functional dependencies that hold among the attributes of a re
    15·1 answer
  • Assume that you have an array of integers named arr. Which of these code segments print the same results?
    15·1 answer
  • What is the purpose of a mail merge field.
    14·1 answer
  • If you're looking to install Gigabit Ethernet, what cabling system would you use?
    9·1 answer
  • You have a computer at home. The computer is connected to the Internet through a dial-up connection. Every time you connect to t
    14·1 answer
  • The length of the hypotenuse of a right-angled triangle is the square root of the sum of the squares of the other two sides. Wri
    7·1 answer
  • List of rules for expert systems​
    6·1 answer
  • Why the computer is known as versatile and diligent device ? explain.<br>​
    15·1 answer
  • You work with alot of different documents in your internship with a software development company. What kinds of actions can you
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!