Consider the following snippet of code in a 32-bit computer.

#define max 10
struct contact {
char name[30];
char email[30];
int phone;

};
struct contact A[max];

What is the size of the entire array A in bytes?

Answers

Answer 1

We begin with centralized systems because they are the most intuitive, understandable, and easy to define.

Centralized systems are client/server architecture systems in which one or more client nodes are directly connected to a central server. In many firms, this is the most prevalent sort of system, in which a client submits a request to a company server and receives the response. Vertical scaling is only feasible on the central server. Horizontal scaling will contradict the system's single central unit feature of a single central entity.

main()  

{  

  char x [10], *ptr = x;  

 scanf ("%s", x);  

 change(&x[4]);  

}  

change(char a[])  

{  

  puts(a);  

}  

Learn more about server here-

https://brainly.com/question/3211240

#SPJ4


Related Questions

How do you insert text into a presentation?

by clicking in a placeholder and entering text
by clicking in the task pane and entering text
by drawing a text box, clicking in it, and entering text
by selecting Text from the Insert menu

Answers

Answer:

Hello your answer is:

clicking in a placeholder and entering text

drawing a text box, clicking in it, and entering text

Explanation:

I did the assignment on edge 2021-2022

Answer: clicking in a placeholder and entering text, and

drawing a text box, clicking in it, and entering text

A medical data agency is using an application that maintains social security numbers and birth dates in a database to track medical records across multiple offices. The office wants to ensure that the data is protected but has the ability to restore it to its true state when needed. Which of the following de-identification methods should the application adopt

Answers

In the case above about the application, the de-identification methods that the agency should adopt is known to be the  bar codes.

What is bar code code?

A barcode is made up of bars and spaces and it is known to be a machine-readable depiction of numerals and characters.

The use of bar code is one that will make the medical agency to track the medical records easily.

Note that stripes which are barcodes are often used in supermarkets and The de-identification methods that the agency should adopt is known to be the  bar codes.

Learn more about bar codes from

https://brainly.com/question/13117502

#SPJ1

Critical thinking questionsin this unit, you used this code to ensure that the user would enter a number and not letters:while true: try: num = int(input("enter your age: ")) break except valueerror: print("that's not a number!")how could you modify this code to be sure that the user enters a positive number?you are writing a program in javascript that asks users to input their grade level. you want to check for errors and give the users an error message if they 1) enter a blank, 2) enter letters instead of numbers, or 3) enter a number greater than 12. what would the pseudocode look like for a function that would check these things?in this lesson, you learned that the five most common python errors are incorrect indentation, count errors in loops, confusion of single and double equal signs, punctuation errors, and spelling errors. based on your own programming experience, what are some other common errors? what are some things that you can do to avoid or easily catch those errors?you are creating a function that will test whether a number is greater than 10 using these lines of code:if a < 10: print(a "is greater than 10")can you identify one syntax error and one logic error in these lines? why do you think a programmer might have made the logic error?you are creating a program in which the user will input his or her age. the program will calculate the year that the user was born and will then tell the user which decade he or she was born in. here is part of the code:if year > 1989 and year < 2000 print("you were born in the 1980s")can you identify one syntax error and one logic error in these lines? how do you think you could avoid making logic errors like the one in this code?

Answers

The syntax error in the code is the missing comma in the print statement. The correct line should be print(a, "is greater than 10").

How to write the syntax

1. Modifying

while True:

   try:

       num = int(input("Enter your age: "))

       if num > 0:

           break

       else:

           print("That's not a positive number!")

   except ValueError:

       print("That's not a number!")

2. Pseudocode

FUNCTION checkGradeLevel(gradeLevel):

   IF gradeLevel is empty THEN

       PRINT "Grade level cannot be blank"

   ELSE IF gradeLevel is not a number THEN

       PRINT "Please enter a number for grade level"

   ELSE IF gradeLevel is greater than 12 THEN

       PRINT "Grade level cannot be greater than 12"

   ELSE

       PRINT "Grade level is valid"

END FUNCTION

3. Syntax and Logic Errors in the Code

The syntax error in the code is the missing comma in the print statement. The correct line should be print(a, "is greater than 10"). The logic error is in the conditional statement: if a is less than 10, the message should not say that a is greater than 10. The programmer might have made this mistake by misreading the less-than operator as a greater-than operator.

Read more on syntax errors here:https://brainly.com/question/30360094

#SPJ4

Which of the following is a good thing to do prior to creating a Pivot Table?
Delete any blank rows Or coloums
delete fields of data
delete coloums of data
Abbrietive coloum names​

Answers

One good thing to do prior to creating a Pivot Table is to "abbreviate column names." The correct option is (d).

To ensure that your data is in a well-organized and clean format you should also consider using abbreviative column names for long and complex column names, as this will make it easier to read and analyze the data.

Additionally, it is a good practice to ensure that your data is in a tabular format, with each column representing a unique data category and each row representing a single observation. This will help to ensure that your Pivot Table is accurate and reflects the true nature of your data. You should also eliminate any duplicate values, empty cells, or inconsistencies in the data.

Overall, taking these steps prior to creating a Pivot Table will help to streamline the process and ensure that your data analysis is as effective and accurate as possible.

Therefore, the correct answer is an option (d).

For more such questions on Pivot Table:

https://brainly.com/question/30543245

#SPJ11

how many cells does the human body have,and how many types are there?

Answers

Answer:

The cells inside our bodies are “specialized.” This means that each type of cell performs a unique and special function. For this reason, each of the 200 different types of cells in the body has a different structure, size, shape, and function, and contains different organelles.

Explanation:

I hope this helps Ik its not fully answered Im srry:(

{CHANCE TO EARN 75 POINTS}

Using Python, create a function for the cost to buy a car with the following arguments:

-Initial Price

-Sales Tax

Sales Tax is about 4.2% in Virginia, 7.3% in California, and 6.3% in Texas.

Find the cost of buying a car with an initial cost of $22,000 in Virginia.

Find the cost of buying a car with an initial cost of $30,000 in Texas.

Find the cost of buying a car with an initial cost of $50,000 in California.

Answers

def getCarPrice(initialCost, salesTax):

return initialCost*(1+salesTax)

x = getCarPrice(22000, 0.042)

y = getCarPrice(30000, 0.063)

z = getCarPrice(50000, 0.073)

Web technologies like Flash, CSS, Java, and HTML often depend on APIs to accomplish what task?

Answers

In Programming, web technologies like the front end part e.g Flash, CSS, Java, and HTML  depends on back end APIs for task like data persistence, sending and getting data e.g post and get request in summary perform CRUD(Create, read, update and delete) operations

The development of web application is basically divider into two

The front end, done basically with technologies like HTML CSS, JavaScriptBack end, this can be done using Python, C#, Java, or any suitable language

Th front end depends on the back end for sending and retrieving information

Learn more:

https://brainly.com/question/8391970

Explain the concept and importance of "Integration" in ERP
systems. Give an example for what could happen if an enterprise
does not operate with an integrated system in this context.

Answers

In any company or organization, the various departments or business units operate independently and maintain their own records.

Integration is a term used to refer to the process of linking all of these diverse units together so that the company can function as a cohesive entity.ERP (Enterprise Resource Planning) is a software application that automates the integration of a company's operations, including finance, procurement, manufacturing, inventory management, and customer relationship management. ERP provides a framework for the integration of different systems, data, and processes within an organization.ERP systems are designed to streamline business processes, which improves the efficiency and productivity of the company.

By integrating all of the systems in an enterprise, companies can reduce redundancies, improve communication, and minimize errors.The importance of integration in ERP systems is that it allows organizations to achieve a more comprehensive and cohesive view of their operations. This, in turn, allows companies to make better decisions and operate more efficiently.

It also helps reduce costs by eliminating duplication of effort and streamlining processes.For example, if an enterprise does not operate with an integrated system, it could lead to various problems such as poor communication between departments, duplicate data entry, and difficulty in maintaining accurate records. This can result in delays, errors, and inefficiencies, which can ultimately lead to decreased customer satisfaction and lower profits.In conclusion, integration is essential in ERP systems as it allows organizations to operate efficiently and effectively. The integrated system will provide a more complete view of the company's operations, enabling management to make better decisions and optimize business processes. Failure to integrate systems can lead to inefficiencies, errors, and increased costs.

Learn more about data :

https://brainly.com/question/31680501

#SPJ11

Give three general features of application software

Answers

Answer:

Three general features of application software are:

1. User Interface: Application software has a user interface that allows users to interact with the program. This interface can include menus, icons, buttons, and other graphical elements that make it easy for users to navigate the software and access its features.

2. Functionality: Application software is designed to perform specific tasks or functions. Examples of application software include word processors, spreadsheet programs, graphic design software, and web browsers. Each of these programs has a specific set of features and functions that are tailored to the needs of its users.

3. Customization: Application software can often be customized to meet the specific needs of individual users or organizations. For example, a spreadsheet program can be customized to include specific formulas and calculations that are unique to a particular business or industry. Customization allows users to tailor the software to their specific needs, making it more efficient and effective for their particular use case.

Equi Technologies offers cloud computing services to several data centers around the world. It hosts services in the cloud, which can be accessed by clients through Equibrowse-a Web browser designed by Equi Technologies. In the context of cloud computing services, it is evident that Equi Technologies provides _____.

Answers

Answer:

The answer is "Software as a service".

Explanation:

The software license strategy permits access to the software via a remote server through subscription-based access to the software. Rather than installing software on each user's PC, SaaS lets them access applications via the Internet.

For a number of reasons, it could save you money. Purchase/installation costs and also ongoing maintenance and upkeep are avoided, which is the primary benefit. SaaS apps may be easily downloaded and managed without breaking the bank on hardware parts and upgrades.

ITEMS
Evan spent 25% of his money on rent and g on food, together his
expenses totaled to $75.00. Calculate the total amount of money Evan had​

Answers

Answer:

Total money he had = $136 (Approx.)

Explanation:

Given:

Spend on rent = 25%

Spend on food = 30%

Total of expenses = $75

Find:

Total money he had

Computation:

Total money he had = [Total of expenses][100/ (Spend on rent + Spend on food)]

Total money he had = [75][100/ (25 + 30)]

Total money he had = [75][100/ (55)]

Total money he had = 136.36

Total money he had = $136 (Approx.)

PLEASE HELP, THIS IS FROM FLVS AND THE SUBJECT IS SOCAL MEADA. YES THAT IS A CORSE.
Josh frequently posts in an online forum to talk about his favorite video game with other players. For the past few weeks, a poster he doesn't know has been harassing Josh in the forums, calling him names and publicly posting hateful messages toward Josh with the intent of starting an argument.

In this situation Josh should consider changing his forum screen name to avoid this cyberbully.

1. True
2. False

Answers

The answer is true (please mark me brainleiest)

Question 7 what are some of the shortcomings of antivirus software today? check all that apply.

Answers

Answer:

Modern day anti-viruses have a few shortcomings:

1.) False detections. Anti-viruses use a set of algorithms to determine whether or not a application or library contains harmful code such as trojans or rats. But sometimes an anti-virus will flag a file it thinks is dangerous when the file is harmless.

2.) Disk space. Any file or executable takes up disk space in order to exist on your computer; anti-viruses are no exception to this. Anti-viruses may take up a large amount of space on your drive.

3.) Slows down computer. Anti-viruses are constantly loaded into memory to protect your computer. Due to this, they impact your computer's performance.

4.) Don't always work. Any dedicated virus creator will try find a way to bypass anti-viruses and sometimes may succeed. This makes anti-viruses completely useless when it comes to viruses that can bypass them.

Let the sign of q2 be changed from positive to negative. At which position can the point charge q be placed now so that the net electrostatic force on it is zero?.

Answers

The point charge q can now be placed at the midpoint between q1 and q2 so that the network connection electrostatic force on it is zero.

When the sign of q2 is changed from positive to negative, the direction of the electrostatic force exerted on q2 gets reversed. At this point, the net electrostatic force on q will no longer be zero. To make the net electrostatic force on q zero, q must be placed at the midpoint between q1 and q2. This is because when q is placed at the midpoint, the force exerted by q1 and q2 will cancel each other out and the net force on q will be zero. Therefore, the point charge q can now be placed at the midpoint between q1 and q2 so that the net electrostatic force on it is zero.

Learn more about network connection here:

brainly.com/question/29970297

#SPJ4

What are the 5 major components of an incident management system?

Answers

A coordinated collection of processes and procedures known as an incident management system (IMS) is used to manage and address unforeseen events or incidents. Control and command, Planning; coordination; execution, Logistics.

A management system is a collection of practises, guidelines, and regulations created to help a company accomplish its goals successfully and efficiently. An company may plan, carry out, measure, and continuously improve its performance with the help of a well-designed management system. It aids in ensuring efficient resource use, the identification and management of risks, and ongoing adherence to legal and regulatory standards. Leadership commitment, paperwork, communication, training, monitoring, and feedback are typical elements of a management system. Organizations can improve the quality of their goods and services, save costs, and boost efficiency with the help of effective management systems. For enterprises to accomplish their strategic aims and objectives in a dependable and sustainable way, they are crucial.

Learn more about management system here:

https://brainly.com/question/30465657

#SPJ4

What are some technical challenges and questions that arise from the need to represent digital information in computers and transfer it between people and computational devices?

Answers

Answer:

security

Explanation:

One technical issue that arises from this is security. Many times the information that is being transferred is private or even valuable, therefore grabbing the attention of hackers/thief's that want this information. This makes security highly important, but making sure that the information is completely secure is impossible. The best that can be done is adding certain safety measures to secure the information as much as possible, which in term is a technical challenge.

Vivian and other members of her group are attending an event where they have to give short, uninterrupted speeches, one after the other. The moderator has a passive role during the course of the discussion, he or she has to simply introduce the presenters and manage the time frame of the event. At the end of the discussion, the moderator engages with the presenters and audience to ask questions and point to areas of agreement or disagreement.

Vivian is part of a _____.

Answers

Answer:

Panel discussion at a symposium

Explanation:

A symposium is a discussion held in public and arranged so that groups of experts in a particular field of study can come together and present information, papers, discoveries, and new researches and also to provide recommendations as to what is and not to be done

A moderator for the symposium and the panel members usually seat in front of an audience to whom a prepared brief report is presented by the panel group members after which the key point may be summarized by the moderator and the audience can take part in asking questions which are answered by the panel members

Therefore;

Vivian is part of a panel discussion at a symposium

2. Why do you think the order of operations still applies in Java? Give an example to show what could happen if you didn't use order of operations? 3. Why is it important to know the type of a variable?​

Answers

The order of operations still applies in Java because it is made up of a number of rules that helps to  decide the operators that are evaluated.

Does order of operations apply in Java?

Yes, Java is known to be one that tends to adhere as well as follows the standard arithmetic order that is made for their operations.

In Java, the order of an operator are seen to always examine themselves from left-to-right and the argument lists are always examined from left-to-right.

An example is seen in the expression of : A() + B() * C(D(), E()), where the given subexpressions are said to be examined in the order of: A(), B(), D(), E(), and C()

Therefore, The order of operations still applies in Java because it is made up of a number of rules that helps to  decide the operators that are evaluated.

Learn more about Java from

https://brainly.com/question/25458754

#SPJ1

What will the following code do? const int SIZE = 5; double x[SIZE]; for (int i = 2; i <= SIZE; i++) x[1] = 0.0; OA. Each element in the array is initialized to 0.0. B. Each element in the array, except the first, is initialized to 0.0. C. Each element in the array, except the first and the second, is initialized to 0.0. An error, reported or not, will occur when the code runs (Note that if there is an error, it supersedes any of the previous answers for purposes of this question)

Answers

The given code initializes all the elements in the array except the first element, to 0.0. Hence, option B is correct.

What is an array? An array is a collection of data elements that are of the same type and accessed using a common name. Array indices begin with 0 and end with n-1, where n is the number of elements in the array.

What is a constant? A constant is a value that cannot be modified in the code and is specified by the keyword const. Constants can be of any data type, including integers, floats, and arrays, among others.

What does the code do? cons t in t SIZE = 5; double x[SIZE]; for (int i = 2; i <= SIZE; i++) x[1] = 0.0; The given code initializes all the elements in the array except the first element, to 0.0.

This is because the loop begins at index 2 (not 1) and continues until the end of the array. The second element in the array (at index 1) is not modified because it is outside the loop. Hence, option B is correct.

To know more about code visit:

https://brainly.com/question/15301012

#SPJ11

Which frame forwarding method receives the entire frame and performs a CRC check to detect errors before forwarding the frame?
cut-through switching
store-and-forward switching
fragment-free switching
fast-forward switching

Answers

The frame forwarding method that receives the entire frame and performs a CRC (Cyclic Redundancy Check) check to detect errors is C: the store-and-forward switching method.

What is the store-and-forward switching?

In store-and-forward switching, the switch receives the entire frame, checks it for errors using the CRC check, and then forwards it out the appropriate port. If errors are detected, the frame is discarded. This method ensures that only error-free frames are forwarded, which helps to prevent network congestion and reduces the likelihood of data corruption.

Therefore, Cut-through switching and fast-forward switching are both methods of forwarding frames without performing a full error check, which can lead to errors being propagated through the network. Fragment-free switching is a modified version of cut-through switching that only reads the first 64 bytes of a frame before forwarding, which can help to reduce the chances of forwarding a frame with errors.

Read more about switching here:

https://brainly.com/question/30214142

#SPJ1

Present value of an ordinary annuity. Fill in the missing present values in the following table for an ordinary annuity: (Click on the following icon □ in order to copy its contents into a spreadsheet.)

Answers

The present value for the fourth row is $292,543.19.

To calculate the missing present values for an ordinary annuity, you can use the present value of an ordinary annuity formula. The formula for the present value of an ordinary annuity is:PMT x [1 - 1 / (1 + r)n] / r where PMT is the periodic payment, r is the interest rate, and n is the number of periods.To calculate the missing present values, you can use the formula above and input the given values. Here is the completed table:PeriodsPaymentInterest RatePresent Value110% $10,00020$10,0005%$161,095.1020$?5%$17,652.132530% $15,00010$15,0008%$108,967.1230$?8%$292,543.19To get the present value for the second row, we can input the given values into the formula:PMT = $10,000r = 5% (convert to decimal by dividing by 100) = 0.05n = 20Using these values in the formula, we get:Present value = $10,000 x [1 - 1 / (1 + 0.05)20] / 0.05 = $17,652.13Therefore, the present value for the second row is $17,652.13.To get the present value for the fourth row, we can input the given values into the formula:PMT = $15,000r = 8% (convert to decimal by dividing by 100) = 0.08n = 30Using these values in the formula, we get:Present value = $15,000 x [1 - 1 / (1 + 0.08)30] / 0.08 = $292,543.19.

Learn more about present value here :-

https://brainly.com/question/28304447

#SPJ11

The for loop is a ___________type of loop.

a. post iterative

b. prequalified

c. posttest pretest

d. none of the above

Answers

A loop is used to repeat a set of instructions multiple times. The for loop is a type of loop that allows us to iterate over a sequence of values, such as a list or a range of numbers.

Here's how the for loop works:

1. First, you declare the loop variable and initialize it with a starting value.
2. Then, you specify the condition for the loop to continue iterating. This condition is usually based on the loop variable.
3. Next, you specify the action to be performed on each iteration of the loop. This can be a block of code or a single statement.
4. Finally, you update the loop variable at the end of each iteration.

The for loop takes the following form:

for variable in sequence:
   # code block

The variable takes on each value from the sequence on each iteration of the loop. The loop will continue until all the values in the sequence have been processed.

The for loop is prequalified because the condition for the loop is checked before each iteration. If the condition is false initially, the loop will not execute at all.

To know more about initialize visit:

https://brainly.com/question/32209767

#SPJ11

in makecode arcade, which part of the interface can be used to answer questions about how a block functions?

Answers

in make code arcade, The Advanced section is the part of the interface can be used to answer questions about how a block functions.

What is the function about?

In Blocks, Functions is known to be the element that one can find under the Advanced section.

Note that in finding functions in block, student can be be introduced to Simple functions.

Hence, in make code arcade, The Advanced section is the part of the interface can be used to answer questions about how a block functions.

Learn more about block functions from

https://brainly.com/question/17043948

#SPJ1

Answer:

The right side panel

Explanation:

On the right side panel you can see the various functions of specific block functions in MakeCode Arcade.

PLS HELP ASAP ILL GIVE BRAINLKEST PLS THANKS 20 POINTS

PLS HELP ASAP ILL GIVE BRAINLKEST PLS THANKS 20 POINTS

Answers

Scroll Down to See Answer ↓

∧-∧ But Read the Explanation to Make Sure ∧-∧

Answer/Explanation:

These algorithms have undergone extensive security analysis and are continually tested to ensure that they provide adequate security. Cryptographic algorithms will usually use cryptographic keys and when these algorithms need to be strengthened, it can often be done by using larger keys.

Encryption uses complex algorithms to scramble data and decrypts the same data using a key provided by the message sender. Encryption ensures that information stays private and confidential, whether it's being stored or in transit. Any unauthorized access to the data will only see a chaotic array of bytes.

The strength of an algorithm, is defined both in terms of it's key size, as well as it's resistance to cryptanalytic attacks. We say an algorithm is broken if there exists an attack better than brute force. So, with AES and a 128-bit key, AES is considered "secure" if there is no attack that less than 2^128 work.

There seems to be an emerging requirement to specify cryptographic strength objectively  rather than subjectively with adjectival descriptors such as weak, good or strong. It is expected  that U.S. Government (USG) and industry will soon require specific quantitative data to define the  point at which a cryptographic technology or product will satisfy user requirements.

Knowing that these 2 Choices Don't really look Right...

Because it our job = Wrong

Because encryption algorithm are always weak = Wrong

So It leads us to these...

To Prevent all Decryption = ?

To protect online Information = ?

But Base on the Information below:

Encryption can help protect data you send, receive, and store, using a device. That can include text messages stored on your smartphone, running logs saved on your fitness watch, and banking information sent through your online account.

Encryption is the process that scrambles readable text so it can only be read by the person who has the secret code, or decryption key. It helps provide data security for sensitive information.

Vast amounts of personal information are managed online and stored in the cloud or on servers with an ongoing connection to the web. It’s nearly impossible to do business of any kind without your personal data ending up in an organization’s networked computer system, which is why it’s important to know how to help keep that data private.

I would say the Answer is To Protect Online Information.

You could Read the Explanation Above If you want to Check.

[RevyBreeze]

B(int w, int x, int y, int z) : ______________________; When forming the initializer list for class B (child class to A)

Answers

B(int w, int x, int y, int z) : A(w,x), m_y(y), m_z(z) {} (Assuming that m_y and m_z are member variables of class B that correspond to the values y and z respectively)

When forming the initializer list for class B (which is a child class to class A), you can use the following syntax:
B(int w, int x, int y, int z) : A(w, x), memberVariableY(y), memberVariableZ(z) { };
In this example, "forming" the initializer list involves specifying the constructor for class A (the parent class) with parameters w and x, and initializing the member variables of class B with parameters y and z.

To learn more about Variables Here:

https://brainly.com/question/30458432

#SPJ11

idea citizen activation

Answers

Answer:Idea citizen activation badge is a part of the idea silver award and is in the citizen category,helping you learn digital awareness,safety and ethics.

Answer: The Citizen Activation badge is part of the iDEA Silver Award and is in the Citizen category, helping you learn digital awareness, safety and ethics.

Want to know more about iDEA?

iDEA helps people develop digital, enterprise & employability skills for free. Log in or sign up to start a badge and begin to earn points on iDEA.

Give an example where traditional laws and modern media have created "grey areas".

Answers

mainly through firewalls, in order to protect a certain website from hackers or criminals getting into a website, modern media has made grey areas in order to sustain a continuous watch to see if any criminals broke through a firewall

Which word should a programmer use to describe what should happen when the condition of an if statement is NOT met?

A.
iterative

B.
when

C.
else

D.
also

Answers

The word  that should a programmer use to describe what should happen when the condition of an if statement is NOT met is option C. else.

Why are conditional statements used in programming?

When a condition is true or false, a conditional statement instructs a program to take a certain action. If-then or if-then-else statements are frequently used to represent it. The preceding example is a block of code that employs a "if/then" conditional statement.

Therefore, the else statement is used, "to indicate what should happen when the condition of an if statement is not fulfilled," is the proper response since the otherwise statement is typically used when computations are still necessary when a condition in an if and else-if statement is not met.

Learn more about programmer from

https://brainly.com/question/22654163

#SPJ1

Which of the following security measures is a form of biometrics?
TPM
Chassis intrusion detection
BIOS password
Fingerprint scanner

Answers

Answer: Fingerprint scanner

Explanation:

thanks for the points

A fingerprint scanner
This is because a fingerprint scanner requires a humanoid finger and a finger is considered as a part of a human.

2) State True or False. 1. Abacus is an electronic device. 2. ROM is read and writes memory of computer. 3. Header and footer appear at the top and bottom of 4. The first microprocessor is INTEL 4004. 5. CTRL + A is used to print data in M.S. word. Answer the following questions:​

Answers

Answer:

1 false

2 false

3 false

4  true

5 false

Explanation:

Answer:

False, True, True, True, False

Explanation:

1. False, it is a calculation device not electronic device.

2. True

3. True, Header appear at the top and Footer appear at the bottom.

4. True

5. False, Ctrl + A in MS Word or other text platforms is used to select all the text, not to print data in MS Word. To print data in MS Word or other text platforms we use Ctrl + P.

Other Questions
What is the distance from(-3,10) to (-3 ,-9) on a coordinate plane?? (30 PIONT)-1 unit -19 units 1 unit 19 unitsI'll give brainlyest !!! How did Vietnam's landscape and geography createdisadvantages for American troops? What is the role of change, oversight,and error in the writing history I Penalties for your first DUI conviction include ____. david is a decent student in school and enjoys learning. he feels that he can be just as "smart" as anyone else, just as long as he works hard. davids way of thinking could be called a . Answer all parts (french) the philosophy of transcendentalism was based on the idea that understanding is based on reason. no one has the right to exploit others. people are fundamentally good. wealth should be distributed equally among all. 2.2. Define the term "petition" and state THREE ways in which petitions from the youth can help improve service delivery in their communities. The height of a square pyramid-shaped gift box is one half the length ofeach side. The volume of the box is 4,500 in.? How many inches highis the boxPLEASE HELP Which of the following Rogue options is no longer available for 2021?O Sun and Sound PackageO Special Edition Package The graph below shows a declining rate of change. What is the constant rate of change? The Titan retires a $25.9 million bond issue when the carrying value of the bonds is $21.3 million, but the market value of the bonds is $27.3 million. The entry to record the retirement will include: what liquid has the density of 900g/L assume the following information for a client: personal property $89,000 credit card balance $42,000 mortgage loan balance $380,000 checking account $14,000 residence $480,000 taxes $38,000 life insurance cash value $24,000 salary $175,000 growth stock fund $112,000 automobiles $79,000 auto loan balance $29,000 auto payments $18,000 what is the client's net worth? What is the public domain?a) items you could use freelyb) special permission to use copyrighted material if you follow the guidelinesc) items the creator already gave permission to use if you follow their rules an ice cube has the following dimensions : 5.5cm - 8.0cm - 8.4cm its mass is 340g.Calculate: a-its volume b-its density A language arts test is worth 100 points. There are a total of 26 questions. The spelling questions are worth 2 pts and vocab is worth 5 pts. How many of each type of question is there? For this discussion forum, begin by reading the following statement and decide whether you agree or disagree with the statement:In many ways, 18th century Russia was just like 17th century Russia.In a post of several paragraphs, discuss the reasons why you agree or disagree with the above statement. What evidence from the lesson or outside research can you find that supports your stand? Remember, you are developing this post as an argument for or against the boldfaced statement above.After you have posted your position, you will be able to see what your classmates have written. At that point, you will need to critique the content of at least two of your classmates postings. For the purpose of this lesson, critiquing means that you will be reading your classmates posts with an eye for accuracy. You will be looking specifically for places where you can apply supporting evidence from the lesson material or additional sources. It is not enough to simply make a statement regarding your classmates work. For example, "Nice job, I like your post" or "I don't agree with what you are saying" are not sufficient. You are expected to provide the supporting evidence. It is fine to identify inaccuracies in your classmates ideas as long as you provide evidence that supports your point of view.Your response must include more information and critical thought than, I like your posting, or I agree. Remember to support your ideas with details, examples, and/or explanations. If you are having some difficulty generating a thoughtful reply, consider the following sentence starters:One thing that you said that I hadn't thought about was...I feel this is important because...It made me think about...A piece of information that I would like to add is...A question I have is...30 POINTS PLEASE FAST! You will drop the bottle/water mass so that it hits the lever at different speeds. Since an object in free fall is accelerated by gravity, you need to determine the heights necessary to drop the bottle to achieve the speeds of 2 m/s, 3 m/s, 4 m/s, 5 m/s, and 6 m/s. Use the equation Ht = v squared over 2 g. to calculate the height, where Ht is the height, v is the speed (velocity), and g is the gravitational acceleration of 9.8 m/s2.Record these heights in Table B. Determine whether VY//ZW. Justify your answer. ZX = 18, ZV = 6, WX = 24, and YX = 16