Since you wrote a program to compare the portion of drivers who were on the phone. The statements are true are option 2, 3, 4 and 5:
2. You could modify the program to allow the user to enter the data.
3. A different set of observations might result in a larger portion of male drivers being on the phone.
4. Even when confident that the mathematical calculations are correct, you still need to be careful about how you interpret the results.
5. It is important to test your program with a small enough set of data that you can know what the result should be.
<h3>What use does a driver program serve?</h3>
A computer software known as a driver, sometimes known as a device driver, that serves as a bridge between the operating system and a device such a disk drive, or keyboard. The device's collection of specific commands must be thoroughly understood by the driver.
In software, a driver offers a programming interface for managing and controlling particular lower-level interfaces that are frequently connected to a particular kind of hardware or other low-level service.
Therefore, based on the fact that the code you have made is okay, you can make some a notes on what is good and not and then make adjustments.
Learn more about program drivers from
brainly.com/question/28027852
#SPJ1
Answer:
Harold should go with the option C. Wrap text for the columns
Explanation:
Wrapping text in a column helps to avoid reasons to truncate columns. It helps to display the contents of a cell in multiple lines instead of just one line.
This makes the text inserted easily readable and printable.
Harold's best choice is to choose Wrap text for the columns. To do this:
- Select the affected cells.
- Click on the home tab
- Locate the Alignment section
- And click the Wrap text icon.
Answer: Companies and organization are taking several steps to secure their user from internet abuse .The methods are mentioned as follows:-
- Offering security technologies in the form of package along with the service so that the protection resource is not required to be installed or bought from elsewhere such as antivirus technologies.
- Using the web servers that are available with high security features
- Using the websites that persist the built-in feature of giving virus or malicious interruption warnings so that user can become alert
- Making users aware about internet abuse and provide information so that they can identify such happening in the service.
The answer you’re looking for is false
Ctrl+A so you can just center the whole passage but use mouse if you want to center part of the passage.