1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Olin [163]
3 years ago
6

Table Setting in any occasion can add to the beauty and significance of the event. It may

Computers and Technology
1 answer:
Rudiy273 years ago
7 0

Answer:

HMMMM IM THINKING HMMMMM

Explanation:

You might be interested in
Write a function with this prototype:
sp2606 [1]

Answer:

Following are the code to this question:

#include <iostream> //defining header file  

using namespace std;

void numbers(ostream &outs, const string& prefix, unsigned int levels); // method declaration

void numbers(ostream &outs, const string& prefix, unsigned int levels) //defining method number

{

string s; //defining string variable

if(levels == 0) //defining condition statement that check levels value is equal to 0

{

outs << prefix << endl;  //use value

}

else //define else part

{

for(char c = '1'; c <= '9'; c++) //define loop that calls numbers method

{

s = prefix + c + '.'; // holding value in s variable  

numbers(outs, s, levels-1); //call method numbers

}

}

}

int main() //defining main method

{

numbers(cout, "THERBLIG", 2); //call method numbers method that accepts value

return 0;

}

Output:

please find the attachment.

Explanation:

Program description:

  • In the given program, a method number is declared, that accepts three arguments in its parameter that are "outs, prefix, levels", and all the variable uses the address operator to hold its value.
  • Inside the method a conditional statement is used in which string variable s and a conditional statement is used, in if the block it checks level variable value is equal to 0. if it is false it will go to else block that uses the loop to call method.
  • In the main method we call the number method and pass the value in its parameter.  

5 0
3 years ago
In which of the following locations can you edit all of the Properties of a PowerPoint file?
Lapatulllka [165]
Access the File<span> menu, choose </span>Info Pane<span> to get to </span>Backstage view, you can see Properties on t<span>he area on the right side </span>of the current PowerPoint presentation.  <span>Within the </span>Properties<span> pane click the </span>Show All Properties<span>  option , T</span><span>his will displays properties such as </span>Size<span>, the number of </span>Slides<span>,  </span>Hidden Slides<span>, the number of </span>Multimedia Clips, etc.  Some of the entries are editable w<span>ithin the  </span>Properties pane, and some are not. Just move your mouse cursor over any detail of a property. The editable sections will change the cursor into edit mode.  
6 0
3 years ago
To use
sasho [114]

Answer:

Sticky notes

Explanation:

I got the question correct

7 0
3 years ago
The point of (18 ,0) lies on​
zysi [14]
This point lies on the x value
4 0
3 years ago
Read 2 more answers
Is there an ethically acceptable reason to study and use the various attack methods described in this chapter? Can you think of
avanturin [10]

Answer:

Please see below  

Explanation:

Yes, there indeed is ethical justification for hacking certain computer systems. Since computer scientists are required to keep the system secure from external threats, so they make use of it when testing the network for potential loopholes that could make it vulnerable. It is beneficial in that it can help manifest the weaknesses present in the system, which can then be corrected for.

6 0
3 years ago
Other questions:
  • Below is a chart representing portions of resumes from 3 applicants. Which best explains the applicants careers?
    11·1 answer
  • Put the following five steps in the order in which you would perform them to use the Paste Special function: ____. 1. Select and
    5·1 answer
  • You receive a file named Project4.xlsx as an attachment to an email message. What do you expect the file to contain?
    8·1 answer
  • When performing actions between your computer and one that is infected with a virus, which of the following offers No risk of yo
    12·1 answer
  • TRUE OR FALSE! HELP!!
    13·1 answer
  • A large population of ALOHA users manages to generate 50 requests/sec, including both originals and retransmissions. Time is slo
    5·1 answer
  • The __________ tag is used to create a forced line break without starting a new paragraph.
    13·1 answer
  • Identify the terms associated with the given statements below;
    6·1 answer
  • Robert works in a call center and receives a call from Kathy. Kathy says she can no longer access the online reporting applicati
    13·1 answer
  • Nina visited an area that receives a large amount of precipitation during all twelve months and is typically warm year round. Th
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!