1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ElenaW [278]
3 years ago
15

Why are both prereading and post reading strategies used?

Computers and Technology
2 answers:
Scilla [17]3 years ago
6 0
To enhance comprehension 
hram777 [196]3 years ago
6 0

Answer:

C.to enhance comprehension

Explanation:

Gooooooddddd :0

You might be interested in
The type of manager that services all requests for data is known as?
3241004551 [841]
The type of manager that services all requests for data is known as IT service management (ITSM)
8 0
3 years ago
Which type of computer allows the user to enter text by handwriting
mixer [17]

Answer:Pen computing refers to any computer user-interface using a pen or stylus and tablet, over input devices such as a keyboard or a mouse.

4 0
4 years ago
Continuous data
Elena-2011 [213]

Answer: Could be subdivided into smaller and smaller units.

Explanation:

 The continuous data are basically measured in the small units and can be easily subdivided into smaller parts without changing their actual meaning.

The continuous data also contain numeric value and can be divided into smaller and finer meaningful parts.

The continuous data can be measured according to the precision of the system. The size and volume are the example of the continuous data.

7 0
4 years ago
This function receives first_name and last_name, then prints a formatted string of "Name: last_name, first_name" if both names a
pishuonlain [190]

Answer:

Following are the program in the C++ Programming Language.

//set header file

#include <iostream>

//set namespace

using namespace std;

//define class

class format

{

//set access modifier

public:

//set string type variable

 string res;

//define function

 void names(string first_name, string last_name)

 {  

//set if-else if condition to check following conditions

   if(first_name.length()>0 && last_name.length()>0)

   {

     res="Name: "+last_name+", "+first_name;

   }

   else if(first_name.length()>0 and last_name.length()==0)

   {

     res="Name: "+first_name;

   }

   else if(first_name.length()==0 and last_name.length()==0)

   {

     res="";

   }

 }

//define function to print result

 void out(){

   cout<<res<<endl;

 }

};

//define main method

int main() {

//set objects of the class

 format ob,ob1,ob2;

//call functions through 1st object

 ob.names("John","Morris");

 ob.out();

//call functions through 2nd object

 ob1.names("Jhon","");

 ob1.out();

//call functions through 3rd object

 ob2.names("", "");

 ob2.out();

}

<u>Output</u>:

Name: Morris, John

Name: Jhon

Explanation:

<u>Following are the description of the program</u>:

  • Define class "format" and inside the class we define two void data type function.
  1. Define void data type function "names()" and pass two string data type arguments in its parameter "first_name" and "last_name" then, set the if-else conditional statement to check that if the variable 'first_name' is greater than 0 and 'last_name' is also greater than 0 then, the string "Name" and the following variables added to the variable "res". Then, set else if to check that if the variable 'first_name' is greater than 0 and 'last_name' is equal to 0 then, the string "Name" and the following variable "first_name" added to the variable "res".
  2. Define void data type function "out()" to print the results of the variable "res".
  • Finally, we define main method to pass values and call that functions.
3 0
3 years ago
P36. In Section 3.5.4, we saw that TCP waits until it has received three duplicate ACKs before performing a fast retransmit. Why
KatRina [158]

Answer:

The Packets can be arrived out of an order from the Internet Protocol layer.  

So, whenever the out of an order packets would be received then, it would be generated the duplicate ACK's, if we perform the re-transmission after the first duplicate ACK would be lead the senders to introduced too many redundant packets in the networks.

Explanation:

  • All the bytes, in the Transmission Control Protocol connections, are the numbered, from the beginning at the randomly choose the initial sequence number (ISN).  
  • The SYN packets consumes the one sequence number, so the data will be actual and it begins at the ISN+1.  
  • The receivers ack's sequences the number x acknowledged the receipts of all the data bytes that is less than byte the number x.
7 0
3 years ago
Other questions:
  • Whats the 7 internal components found in a computer tower
    11·1 answer
  • Before you start creating a database, you should first use paper to plan, test, and revise. True False
    7·2 answers
  • What is the full path of the directory on this computer containing the SAM registry hive file
    15·1 answer
  • A(n) _____ access file is also known as a direct access file.
    13·1 answer
  • Write the function header (the first line of the function definition) to define a function named DisplayStats that accepts a str
    5·1 answer
  • What do commercial websites use to estimate a visitor's age, gender, and zip code?
    10·1 answer
  • Could u help me on this u just have to compare how its alike please help ​
    5·2 answers
  • In Python in order for a sort to work, which of the following is required?
    14·2 answers
  • What are the 3 rules of music<br><br> ps: there is no music subject so i had to put something else
    15·2 answers
  • What is the difference between margin and padding property?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!