1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Igoryamba
2 years ago
10

What is the purpose of the Print Area feature?

Computers and Technology
2 answers:
Lilit [14]2 years ago
6 0

Explanation:

printing how many copies of a document should print

mojhsa [17]2 years ago
6 0

Answer:

C. selecting specific cells and ranges to print

You might be interested in
You have been using the same computer for several years. To extend its service life, you decide to upgrade the processor. You ch
Gnoma [55]

Answer:

B. Update the UEFI firmware

Explanation:

UEFI (Unified Extensible Firmware Interface) is a standard firmware interface for PCs. It is responsible for waking up the computer hardware components and ensure they are functioning properly.

The old processor was controlled by an older version of the UEFI but to run the new processor, you update the Firmware Interface to enable it communicate with the computer's hardware components.

6 0
3 years ago
Assume you have a sorting algorithm that you can use as a black box. Use the sorting algorithm to sort the input list. Now write
Ber [7]

Answer:

Algorithm explained below

Explanation:

Algorithm to check duplicate when list of element is sorted:

CheckDuplicate( Sorted list )

    initialize count = 0

    Repeat untill we reach on end of list :

            if next is not end of list and current element is equal to next element

                    count = count+1

                    increase the pointer to next untill a different element is found

end CheckDuplicate

Worst Case Time Complexity will be O(n). Because there is only one iteration over the list will be performed.

Yes We have improved the worst case time complexity compared to previous question.

Actually after applying sorting all the similar element to will be next to each other.Then we will start iterating one by one from one side and check which is similar to next.If a different element will be find then we will check whether it's next is similar to it or not.

eg. 1 1 1 2 2 2 4 4 4 we can check duplicate in one iteration.

7 0
3 years ago
1.6.6 Night out for codehs
Yuliya22 [10]

Answer:

import java.util.*;

public class NightOut

{

   public static void main(String[] args)

   {

       Scanner input = new Scanner(System.in);

       double cost;

       double cost2;

       double cost3;

       double grandtotal;

       

       System.out.println("How much did dinner cost?");

       cost = input.nextDouble();

       

       System.out.println("How much is mini-golf for one person?");

       cost2 = input.nextDouble();

       

       System.out.println("How much did dessert cost?");

       cost3 = input.nextDouble();

       

       grandtotal = cost + cost2 * 2 + cost3;

       

       System.out.println("Dinner: " + cost);

       System.out.println("mini-golf: " + cost2);

       System.out.println("Dessert: " + cost3);

       System.out.println("Grand Total: " + grandtotal);

   }

}

Explanation:

5 0
3 years ago
How are engineers are related to technology
vichka [17]
Engineering is the application of knowledge and technology is the body of knowledge:)
4 0
3 years ago
Consider the following C code fragment:
wlad13 [49]

Answer:

10

Explanation:

Pointer arithmetic is tricky. The address is incremented by the sizeof the pointed element. A short is 2 bytes.

So adding 10 adds 20 bytes to the starting address of arr[].

In the expression, you're adding 10-6 = 4 to the start of the array, so you're pointing at the fifth element, arr[4] which is 10.

8 0
3 years ago
Other questions:
  • What CLI command can be issued in CentOS 7 to help you to see every "hop" that a connection makes, including all of the switches
    13·1 answer
  • As you are researching RAM for a computer you are building that will be used as a home office server for his small business. The
    5·2 answers
  • Software can be distributed on the web. <br> a.true <br> b.false
    12·1 answer
  • _____ can render data useless to unauthorized users who might have violated some of the database security layers.
    7·1 answer
  • What are listed in the vertical columns across the top of the Event Editor?
    5·2 answers
  • Citing Wikipedia as a reference is not considered a good practice because 1.leverages a neutral point of view. 2.hosts unopinion
    8·1 answer
  • If a filesystem has a block size of 4096 bytes, this means that a file comprised of only one byte will still use 4096 bytes of s
    12·1 answer
  • Kos-huar-utb garls jonly​
    8·2 answers
  • A ____ is a a set of presentation rules that control how text should look. It is applied to an XML file to change the collection
    9·1 answer
  • Which type of file can be opened directly into Excel?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!