1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
satela [25.4K]
3 years ago
7

When is not appropriate to be funny in a headline

Computers and Technology
1 answer:
8_murik_8 [283]3 years ago
6 0

Answer: I it is something serious like the death of a person then you should not be funny

You might be interested in
var shirt = "blue"; 2. var pants = "gray"; 3. var clothes = wearIt(shirt, pants); 4. function wearIt( x, y) 5. { 6. var myOutfit
pogonyaev

Answer:

Arguments: "blue" and "gray"

Parameters: x and y

Explanation:

In programming, a function can take zero or one or more than one input values. These input value will be held by the variables which are called parameters. In this code snippet, x and y are parameters of wearIt function.

On another hand, when calling a function, we provide the values to the function and the values provided are termed as arguments. In this case, we provide the string blue and gray which are held by shirt and pants variables respectively to the function wearIt. The string "blue" and "gray" will then be passed to parameter x and y which will be processed in the function.  

4 0
4 years ago
Which type of network consists of multiple Windows computers that share information, but no computer on the network serves as an
Alexxandr [17]

The type of network that consists of multiple Windows computers that share information is peer-to-peer. In this network, the computer serves as an authoritative source of user information.

<h3>Peer-to-peer computer networks</h3>

A peer-to-peer (P2P) network can be defined as a type of network where the computer acts as a source of user information.

In P2P, a cluster of different computers are linked and they have the same permissions for processing data in the network.

This type of computer network (peer-to-peer computer network) has been created to serve and/or receive data.

Learn more about peer-to-peer computer networks here:

brainly.com/question/1172049

7 0
3 years ago
You have purchased a used computer from a computer liquidator. When you boot the computer, you find that there has been a passwo
Sergio039 [100]

Answer:

What you should do is to move the motherboard jumper.

Explanation:

Based on the information given in a situation where you boot the computer system in which you find out that there was a password set on the BIOS which full meaning is BASIC INPUT/OUT SYSTEM which means that if You need to clear the set password in order for you to edit the CMOS settings which full meaning is COMPLEMENTARY METAL OXIDE SEMICONDUCTOR What you should do is for you to move the MOTHERBOARD JUMPERS reason been that jumpers will help to set or configure the MOTHERBOARD which is the most important part of a computer and the brain of a computer in order to clear the password so that CMOS setting can be edited.

5 0
3 years ago
I prefer a job where I am praise for good performance or I am accountable for results
Vera_Pavlovna [14]

Answer:

What?

Explanation:

4 0
3 years ago
What is the number 232 in binary
Gnesinka [82]

Answer:

Step 1: Divide (232)x_{10} successively by 2 until the quotient is 0:

232/2 = 116, remainder is 0

116/2 = 58, remainder is 0

58/2 = 29, remainder is 0

29/2 = 14, remainder is 1

14/2 = 7, remainder is 0

7/2 = 3, remainder is 1

3/2 = 1, remainder is 1

1/2 = 0, remainder is 1

Step 2: Read from the bottom (MSB) to top (LSB) as 11101000.

So, 11101000 is the binary equivalent of decimal number 232

(Answer).

5 0
3 years ago
Read 2 more answers
Other questions:
  • _______ ______ is the creation of a computer program by utilizing pictorial elements. Question 36 options: A. Assembly Programmi
    7·2 answers
  • To increase usability, take care to place important content, such as logos, names, CTAs, and major links, ______ of potential sc
    11·1 answer
  • What type of cable is used to connect a workstation serial port to a cisco router console port?
    15·1 answer
  • When an application contains an array and you want to use every element of the array in some task, it is common to perform loops
    14·1 answer
  • Which of the following statements is false? A constructor is similar to a method but is called implicitly by the new operator to
    6·1 answer
  • What does it mean when you mail is labled unable to forward for review
    5·1 answer
  • Who initially developed what is now known as the internet?
    5·1 answer
  • Write two statements to read in values for my_city followed by my_state. Do not provide a prompt. Assign log_entry with current_
    13·1 answer
  • For this scenario related to turtle drawing, indicate whether it is better to write a loop or a function (or a set of functions)
    13·1 answer
  • What sets Web pages apart from other documents is that they contain a special kind of text called ___, which is document text th
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!