1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Delvig [45]
3 years ago
6

Help me with the question please..​

Computers and Technology
1 answer:
PIT_PIT [208]3 years ago
4 0

First addition, then division

You might be interested in
Which keyboard command can be used to delete an image from one slide while adding it to the clipboard so that it can be added in
Trava [24]
Control + x is the answer
7 0
3 years ago
Read 2 more answers
What will be the value of x after the following code is executed? int x = 10; do { x *= 20; } while (x < 5); A. 10 B. 200 C.
dezoksy [38]

Answer:

Option B is the correct answer.

Explanation:

  • In the above code, the loop will execute only one time because the loop condition is false and it is the Do-While loop and the property of the Do-while loop is to execute on a single time if the loop condition is false.
  • Then the statement "x*=20;" will execute one and gives the result 200 for x variable because this statement means "x=x*20".
  • SO the 200 is the answer for the X variable which is described above and it is stated from option B. Hence it is the correct option while the other is not because--
  1. Option A states that the value is 10 but the value is 200.
  2. Option C states that this is an infinite loop but the loop is executed one time.
  3. Option D states that the loop will not be executed but the loop is executed one time
6 0
3 years ago
Read 2 more answers
Help Pls<br>I need about 5 advantages of E-learning​
AnnyKZ [126]

Answer:

Explanation:

E-learning saves time and money. With online learning, your learners can access content anywhere and anytime. ...

E-learning leads to better retention. ...

E-learning is consistent. ...

E-learning is scalable. ...

E-learning offers personalization.

7 0
3 years ago
Read 2 more answers
The memory capacity in bits for performing the operation y = f (x) using the table lookup method, where x is an 8-bit number and
Flura [38]

Answer:

The page field is 8-bit wide, then the page size is 256 bytes.

Using the subdivision above, the first level page table points to 1024 2nd  level page tables, each pointing to 256 3rd page tables, each containing 64 pages. The program's address space consists of 1024 pages, thus we need we need 16 third-level page tables. Therefore we need 16 entries in a 2nd level page table, and one entry in the first level page table. Therefore the size is: 1024 entries for the first table, 256 entries for the 2nd level page table, and 16 3rd level page table containing 64 entries each. Assuming 2 bytes per entry, the space required is 1024 * 2 + 256 * 2 (one second-level paget table) + 16 * 64 * 2 (16 third-level page tables) = 4608 bytes.

First, the stack, data and code segments are at addresses that require having 3 page tables entries active in the first level page table. For 64K, you need 256 pages, or 4 third-level page tables. For 600K, you need 2400 pages, or 38 third-level page tables and for 48K you need 192 pages or 3 third-level page tables. Assuming 2 bytes per entry, the space required is 1024 * 2 + 256 * 3 * 2 (3 second-level page tables) + 64 * (38+4+3)* 2 (38 third-level page tables for data segment, 4 for stack and 3 for code segment) = 9344 bytes.

Explanation:

16 E the answer

5 0
3 years ago
Was communication always formal?
DaniilM [7]
No. Communication not always formal.
4 0
3 years ago
Other questions:
  • Devices used for viewing images from one computer to another over the internet
    6·1 answer
  • TRUE/FALSE: In order to use an object in a program, its class must be defined.
    10·1 answer
  • The primary role of the firewall is to: block unauthorized access to and from the system. quarantine any malware until it can be
    11·1 answer
  • Define a model or version that is used to test an idea is called a _______.
    7·1 answer
  • When setting permissions on an object to Full Control, what otherpermissions does this encompass?Read, Write, Execute, and Modif
    13·1 answer
  • CAD software example​
    5·1 answer
  • Write a program that accepts a whole number as
    5·1 answer
  • Give three general reasons for the importance of computer networking.
    9·1 answer
  • Give reasons why you care for your sense organs​
    10·2 answers
  • To call the superclass's no-parameter constructor explicitly, use super(); group of answer choices true false
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!