1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexdok [17]
2 years ago
10

On mobile devices, the term ________ describes restarting the device, whether you do it from within the OS or with hardware butt

ons on the device.
Computers and Technology
1 answer:
serg [7]2 years ago
8 0
The term Soft Reset describes restarting the device whether you do it from the OS or with hardware buttons on the device.
You might be interested in
Write a function which the counts the number of odd numbers and even numbers currently in the stack and prints the results.
Lerok [7]

Answer:

See the code below and the algorithm explanation on the figure.

Explanation:

The explanation in order to get the answer is given on the figure below.

Solving this problem with C. The program is given below:

#include <stdio.h>

int main(void) {

   int n, Even=0, Odd=0, Zeros=0;  

   for (;;) {

       printf("\nEnter the value the value that you want to check(remember just integers): ");

       //IF we input a non-numeric character the code end;

       if (scanf("%d", &n) != 1) break;

       if (n == 0) {

           Zeros++;

       }

       else {

           if (n % 2) {

               Even++;

           }

           else {

               Odd++;

           }

       }

   }  

   printf("for this case we have %d even, %d odd, and %d zero values.", Even, Odd, Zeros);

   return 0;

}

5 0
3 years ago
Variable index has a value of 4, and variable accessValid has a value of False. What value does variable, accessPoints, have aft
snow_lady [41]

Answer:

10

Explanation:

If index is greater than or equal to 2, accessPoints will increase by 10 even if accessValid is false because the if statement states that if index is greater than or equal to 2 OR accessValid is true. The if statement gets executed if either expression is true, and index is greater than 2 because index has a value of 4.

8 0
3 years ago
What are movies filmed before 1990's?
natita [175]

Answer: Once Upon a Time in the West (1968) PG-13 | 165 min | Western. ...

Cinema Paradiso (1988) R | 155 min | Drama. ...

Blade Runner (1982) R | 117 min | Action, Sci-Fi, Thriller. ...

2001: A Space Odyssey (1968) G | 149 min | Adventure, Sci-Fi. ...

Apocalypse Now (1979) ...

Chinatown (1974) ...

Stardust Memories (1980) ...

Le Notti Bianche (1957)

Explanation:

8 0
3 years ago
In cell g6, enter a formula that calculates the discount rate for the off-peak rental price per day. for example, using the peak
Tresset [83]

The peak rentals  per day values are 149.95  

the off peak rentals per day values are 120.


formula must start with = because it is in excel

3 0
3 years ago
After an entry in the medical record has been written or keyed and an error is discovered, what procedure should be followed to
Readme [11.4K]

Answer:

(C) Draw a line through the error; then call the patient’s physician.

Explanation:

According to my research on medical procedures, I can say that based on the information provided within the question the best procedure that should be taken in this situation would be to draw a line through the error; then call the patient’s physician. By doing so you get rid of the the error and by telling the patient's physician you get rid of any possibility of the physician still thinking that the error was something that was already done.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

5 0
3 years ago
Other questions:
  • ​You work at a call center of a large bank where you answer credit card services related questions from customers. Lately, you h
    14·1 answer
  • In addition to the ping command, what other command is useful in displaying network delay and breaks in the path to the destinat
    5·2 answers
  • Prompt the user ‘Enter a row vector of any numbers’ in the command window, and enter an arbitrary row vector and store it to x.
    6·1 answer
  • In symmetric encryption the same key is used to encrypt and decrypt a message. in asymmetric encryption different keys are used
    6·2 answers
  • Create an array to hold the rainfall values. Create a 2nd parallel array (as a constant) to hold the abbreviated names of the mo
    9·1 answer
  • PLEASE I NEED HELP FAST
    8·1 answer
  • How does computer number system play a Vital role in a computer calculation. ​
    8·1 answer
  • The notes added to slides can be seen during the presentation. TRUE OR FALSE​
    13·1 answer
  • Anyone who do bug bounty hunt ?​
    10·1 answer
  • Any changes done to the software during the operational phase of the software before project wind up is called as maintenance. S
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!