if the data in memory location n7:10 are transferred to memory locations n10:3 to n10:6, then the process is called . question 4 options: 1) a file to word transfer 2) an integer to floating point transfer 3) a file to file transfer 4) a word to file transfer

Answers

Answer 1

A word to file transfer involves moving or copying data from a specific memory location to a set of other memory locations.

If the data in memory location n7:10 are transferred to memory locations n10:3 to n10:6, then the process is called a word to file transfer. This means that the data stored in a specific memory location (n7:10) is being moved or copied to another set of memory locations (n10:3 to n10:6). A word is a group of bits or bytes that is the basic unit of data in a computer's memory. This type of transfer is commonly used in computer systems for tasks such as backing up data or copying files.

It is important to note that the specific data being transferred is not specified in the question, only the memory locations involved. This means that the data being transferred could be anything from text to numbers or even program instructions. The process of transferring data from one memory location to another is a fundamental operation in computer systems and is critical to the functioning of various applications and systems. In summary, a word to file transfer involves moving or copying data from a specific memory location to a set of other memory locations.

Learn more about memory location here:

https://brainly.com/question/28328340

#SPJ11


Related Questions

Some number of teams are participating in a race. You are not told how many teams are participating but you do know that:

a. Each team has a name, which is one of the uppercase letters A-Z.

b. No two teams have the same name, so there are a maximum number of 26 teams.

c. Each team has the same number of members.

d. No two runners cross the finish line at the same time – i. E. There are no ties

Answers

Given the information, we can infer the following

a. Each team has a name, which is one of the uppercase letters A-Z:

What does this mean?

This means that there are a maximum of 26 teams, since there are only 26 letters in the English alphabet. Each team name is unique and represented by a single uppercase letter.

b. No two teams have the same name, so there are a maximum number of 26 teams:

As mentioned above, since each team name is unique and represented by a single uppercase letter, there can be a maximum of 26 teams.

c. Each team has the same number of members:

This means that the number of runners in each team is equal. However, we don't know the exact number of runners per team.

d. No two runners cross the finish line at the same time – i.e. there are no ties:

This means that each runner finishes at a different time. There are no ties, so each runner is assigned a unique rank based on their finishing time.

Given these conditions, we can conclude that there are between 1 and 26 teams, each with the same number of runners. The number of runners is unknown but must be a multiple of the total number of teams.

For example, if there are 3 teams, each team could have 1, 2, or 3 runners. If there are 5 teams, each team could have 1, 5, 10, 15, or 20 runners. Finally, we know that each runner finishes at a different time, so there are no ties and each runner is assigned a unique rank.

Read more about races here:

https://brainly.com/question/30791066

#SPJ1

What term did don norman define as story that puts the operation of the system into context, weaving together all of the essential components, providing a framework, a context, and reasons for understanding?.

Answers

Don Norman defined the phrase "story" as a conceptual model. Conceptual models are ethereal, psychological depictions of proper task execution.

In order to systematize processes, people use conceptual models subconsciously and intuitively. For instance, using calendars and diaries to make appointments is a common mental model. Knowing how common and effective conceptual models are helps developers create software that is matched to users' conceptual frameworks.

Designers build on preexisting frameworks and knowledge by producing interfaces and applications that mirror conceptual models, which makes it simpler for users to learn how to use the new product.

Learn more about conceptual models https://brainly.com/question/11274859

#SPJ4

what is the size of the bit vector of a 1tb disk with 512-byte blocks? a. 2 mb b. 28 mb c. 28 mb d. 8 mb

Answers

Option C. Bit vectors are one-dimensional, zero-originated arrays of booleans. They are shown as a series of 0s and 1s separated by the symbol #*, for example, (make-bitvector 8 #f) #*00000000.

Bit vectors can be used with array methods because they are a special instance of one-dimensional bit arrays; for more information, see Arrays. In essence, a bit vector is a vectorbool> because it is a Sequence with the same interface as a vector. The primary distinction is that bit vector is space-efficiently optimized. A bit vector just needs one bit per element but a vector always needs at least one byte.

The translation of memory size into 2 powers is crucial for OS numericals.

Disk size = 1TB = 240 B, then.

Block Size: 4 KB, or 2 12 B

Block count is equal to (240) / (212) = 228 blocks.

Now that we need 1 bit to represent each block in a bit map, the size of the bitmap in bits is 228 bits (to represent 228 blocks).

Bitmap size in Bytes is therefore 228 / 23 = 28 MB

Learn more about arrays here-

https://brainly.com/question/19570024

#SPJ4

A field with the ____ data type stores a unique value generated by Access for each record. It usually starts with 1, and Access will increment the number by 1 as each new record is added.

Answers

Answer:

autonumber data type

quick question;
In two to three sentences, describe how a business can benefit from data mining.

Answers

A company could benefit from data mining finding valuables in said data. They could use it to earn bitcoin which can be cashed out. Also they can find hidden items unreleased in files.

hope this helps! :D

Positives and negatives side effects of government the stimulus check


Help pls☹️

Answers

Answer:

Stımulus check ıs the check offered to cıtızens of America inorder to help them to meet thier needs at that particular point in time. This is done, if there is an unforseen circumstances that made them not to earn an income.

Some of the postitves of stimulus check include:

1. Ability of the citizens to pay for their rent and other bills.

2. Ability to do some shopping and feeding

3. It create the sense of recognition among the citizens that the government always remember them in their moment of their needs.

4. To let the working class people know that their tax payment is used judiciously in helping other citizens.

The negative side effects of stimulus check include:

1. It makes people lazy since it is free money.

2. More money would be spent in the course of trying to meet the needs of everyone.

3. People would manipulate the system thereby getting more than one stimulus pay check.

4. Working class people would be angry with the system. This is because, they wil feel that all their hard work and taxes isbeing used to feed some lazy citizens who has never contributed anything to the country.

5. It would increase the debt profile of the government.

Explanation:

when performing computer forensics what is required to prove a chain of custody?

Answers

When performing computer forensics, proving a chain of custody requires the following: documentation, preservation of evidence, and strict adherence to handling protocols.

How can computer forensics experts establish the integrity of evidence through a chain of custody?

To establish a chain of custody in computer forensics, documentation plays a crucial role. It involves maintaining a detailed record of everyone who has had possession of the evidence, as well as the date, time, and purpose of each transfer. Additionally, preserving the evidence in its original state without any tampering or alteration is essential. Finally, strict adherence to handling protocols ensures that the evidence remains secure and maintains its integrity throughout the investigation.

In computer forensics, the chain of custody refers to the chronological documentation of the custody, control, transfer, and analysis of digital evidence. It is crucial to establish a chain of custody to demonstrate the integrity and reliability of the evidence in a court of law. The process involves three key steps.

Firstly, documentation is essential. It involves recording detailed information about the evidence, such as its description, unique identifiers, location, and the individuals involved in its handling. This documentation serves as a legal record, providing transparency and accountability throughout the investigation.

Secondly, preservation of evidence is paramount. It requires ensuring that the evidence remains unchanged and unaltered throughout the entire forensic process. This involves employing proper storage techniques, such as write-blocking devices or forensic imaging tools, to prevent any accidental or intentional modifications.

Lastly, strict adherence to handling protocols is crucial. Computer forensics professionals must follow standardized procedures when collecting, transporting, storing, and analyzing digital evidence. This includes using proper packaging, sealing, and labeling techniques to maintain the integrity of the evidence and prevent any unauthorized access or tampering.

Establishing a robust chain of custody is vital to maintain the credibility of digital evidence. It helps ensure that the evidence can be trusted and accepted as reliable in a legal setting. By meticulously documenting, preserving, and handling the evidence, computer forensics experts can demonstrate the integrity of the chain of custody and enhance the validity of their findings.

Learn more about Computer forensics

brainly.com/question/14405745

#SPJ11

ASAP

There are two competing scientific theories that try to explain the illusion of animation. Which of these answers is NOT one of the competing theories?


Persistence of Vision


Image-permanence


Phi Phenomenon


The first who answers correct will get brainlest and those that are incorrected will be marked with a red flag.

Answers

It’s image-permanence. Hope that helps

Alice just wrote a new app using Python. She tested her code and noticed some of her lines of code are out of order. Which principal of programing should Alice review?

Hand coding
Line coding
Planning & Analysis
Sequencing

Answers

Answer:

Sequencing

Explanation:

I have taken the test

According to the shared responsibility model who is responsible for security in the cloud.

Answers

The shared responsibility model is a framework that outlines the responsibilities of both the cloud service provider and the customer when it comes to security in the cloud. In this model, the responsibilities are divided between the two parties to ensure a comprehensive and secure environment.

The cloud service provider is responsible for the security "of" the cloud. This includes securing the underlying infrastructure, such as the data centers, network, and servers. They also manage and maintain the physical security of the facilities, including access controls and surveillance.
Additionally, the cloud service provider is responsible for the security "of" the cloud services they offer. This involves implementing measures to protect against unauthorized access, ensuring data confidentiality, and managing backups and disaster recovery plans.
On the other hand, the customer is responsible for the security "in" the cloud. This means they have to take appropriate security measures within their own environment and when using the cloud services. This includes properly configuring and managing their cloud resources, implementing access controls and user management, and securing their applications and data.
To better understand this concept, let's consider an example:
Suppose a company decides to migrate their website to a cloud hosting provider. The cloud service provider would be responsible for securing the physical infrastructure, network, and ensuring the availability of the website. They would handle tasks like patching and updating the servers, protecting against distributed denial-of-service (DDoS) attacks, and maintaining firewalls.
However, the company would be responsible for securing their website and the data it contains. They would need to ensure that proper authentication mechanisms are in place, use strong passwords, and regularly update their website's software to address any vulnerabilities. They would also be responsible for implementing secure coding practices to prevent attacks such as SQL injection or cross-site scripting.
In summary, the shared responsibility model establishes that the cloud service provider and the customer have different responsibilities when it comes to security in the cloud. The provider is responsible for the security "of" the cloud and the services they offer, while the customer is responsible for the security "in" the cloud, which includes their own applications, data, and configurations.

To learn more about secure environment
https://brainly.com/question/31550885
#SPJ11

Python and using function

Takes two integer parameters. Returns the integer that is closest to 10

Answers

Answer:

def closest_to_10(num1, num2):

   if num1-10 < num2-10:

       return num2

   else:

       return num1

Explanation:

Design a class named Rectangle to represent a rectangle. The class contains: Two double data fields named width and height that specify the width and height of the rectangle. The default values are 1 for both width and height. A no-arg constructor that creates a default rectangle. A constructor that creates a rectangle with the specified width and height. A method named getArea() that returns the area of this rectangle. A method named getPerimeter() that returns the perimeter. Draw the UML diagram for the class and then implement the class. Write a test program that creates two Rectangle objects-one with width 4 and height 40 and the other with width 3.5 and height 35.9. Your program should display the width, height, area, and perimeter of each rectangle in this order. UML diagram (as PDF format) Screenshots of input and output of your program (as PDF format) .

Answers

The UML diagram for the Rectangle class is shown below:UML diagram for Rectangle :The Rectangle class is implemented in Java as follows: public class Rectangle { private double width; private double height; /** * Constructor for default rectangle */ public Rectangle() { width = 1; height = 1; } /** *

Constructor for rectangle with specified width and height */ public Rectangle(double w, double h) { width = w; height = h; } /** * Returns the area of this rectangle */ public double getArea() { return width * height; } /** * Returns the perimeter of this rectangle */ public double getPerimeter() { return 2 * (width + height); } /** * Main method for testing Rectangle class */ public static void main(String[] args) { Rectangle r1 = new Rectangle(4, 40); Rectangle r2 = new Rectangle(3.5, 35.9); System.out.println("Rectangle 1:");

System.out.println("Width = " + r1.width); System.out.println("Height = " + r1.height); System.out.println("Area = " + r1.getArea()); System.out.println("Perimeter = " + r1.getPerimeter()); System.out.println("Rectangle 2:"); System.out.println("Width = " + r2.width); System.out.println("Height = " + r2.height); System.out.println("Area = " + r2.getArea()); System.out.println("Perimeter = " + r2.getPerimeter()); }}Here's the screenshot of the input and output of the program:Screenshot of input and output of the program

To know more about UML visit :

https://brainly.com/question/30401342

#SPJ11

where to buy a ps5
I really want one please help meh

Answers

Answer:

You can buy one at gamestop, target, walmart, best buy and probably more stores

Answer:

Amazon, walmart, target, gamestop?

Explanation:

I'm sure a quick go ogle search will get u what u want to see, have a nice day and I hope u get what u want!

You rent a locker at a self-storage facility and secure it with a combination lock. This process of accessing things from storage is most analogous to ______in your memory system.

Answers

The process of renting a locker at a self-storage facility and securing it with a combination lock to access things from storage is most analogous to retrieval in your memory system.

Retrieval is the process of accessing and bringing stored information back into conscious awareness when needed.

In the context of the locker analogy, the self-storage facility represents your long-term memory, where you store various pieces of information for an extended period of time. The locker itself symbolizes a specific memory, and the combination lock represents the retrieval cues or prompts required to access that memory.Just as you need the correct combination to unlock your storage locker, your brain needs specific retrieval cues to locate and retrieve the desired information from your long-term memory. These cues can be sensory stimuli, emotions, or contextual clues that help you recall the memory. Once you provide the appropriate retrieval cue, your brain is able to unlock the stored memory, making it accessible to your conscious awareness, much like accessing the contents of your storage locker.In summary, the process of accessing things from a storage locker secured with a combination lock is analogous to the retrieval process in your memory system. Both involve locating and accessing stored information through the use of specific cues or combinations.

for such more questions on conscious awareness

https://brainly.com/question/30488906

#SPJ11

Choose the correct term to complete the sentence.

A _ search can perform a search on the list [1, 10, 2, 3, 5].

Answers

Answer:

search can perform a search on the list

Answer:

linear

Explanation:

yes..

domain expertise and text, numeric, and visual data are all inputs to what phase of the spiral methodology for the data mining process?

Answers

Domain expertise and text, numeric, and visual data are all inputs to engineering phase of the spiral methodology for the data mining process.

What is spiral methodology?

One of the most crucial models for the Software Development Life Cycle that supports risk handling is the spiral model. It appears to be a spiral with numerous loops when represented diagrammatically. The spiral's exact number of loops is unknown and varies from project to project.

A phase of the software development process is referred to as each loop of the spiral. The project manager can alter the precise number of phases required to develop the product depending on the project risks.

The project manager plays a crucial role in the spiral model of product development because they dynamically decide how many phases there will be.

Learn more about spiral model

https://brainly.com/question/18369405

#SPJ4

What initialization vector (IV) do most weak implementations of the Wireless Equivalency Protocol (WEP) use

Answers

24 bits is an initialization vector (IV) which is used by most weak implementations of the Wireless Equivalency Protocol (WEP).

What is Wireless Equivalency Protocol (WEP)?

Wireless Equivalency Protocol (WEP) can be defined as a standard wireless protocol that is designed and developed to provide a significant level of security and privacy on 802.11b wireless local area network (WLAN).

According to the IEEE Wireless Fidelity (Wi-Fi) standard, 24 bits is an initialization vector (IV) which is used by most weak implementations of the Wireless Equivalency Protocol (WEP).

Read more on Wireless Equivalency Protocol here: https://brainly.com/question/13697151

#SPJ1

What kind of variable will you get in python when the following json is parsed:
[ "Glenn", "Sally", "Jen" ]

Answers

The kind of variable will you get in Python when the following JSON is parsed: ["Glenn", "Sally", "Jen"] is option A. A list with three items.

What are Python's four different sorts of variables?

A symbolic name that serves as a reference or pointer to an object is called a variable in Python. You can use the variable name to refer to an object once it has been assigned to it. However, the object itself still holds the data.

There are four different types of variables in Python: integer, long integer, float, and string. Numerical values are defined by integers; long integers are used to define integers with lengths greater than those of a conventional integer.

Note that there are 3 names and as such there will be three items.

Learn more about python  variable from

https://brainly.com/question/28200596
#SPJ1

See full question below

What kind of variable will you get in Python when the following JSON is parsed:

["Glenn", "Sally", "Jen"]

A. A list with three items

B. A dictionary with three key / value pairs

C. A dictionary with one key / value pair

D. Three tuples

E. One tuple

Where do you enter characters for a simple search?
Choose the answer.
Navigation Pane
Replace dialog box
Clipboard
Find Pane

Answers

Answer:



Navigation Pane

For each node in the tree of Figure 4.74: a. Name the parent node. b. List the children. c. List the siblings. d. Compute the depth. e. Compute the height.

Answers

The parent node of each node in the tree of Figure 4.74 can be identified by tracing the path from the node towards the root of the tree. For example, for node A, the parent node is the root node.

The children of each node can be determined by looking at the branches that emanate from the node. The siblings of a node are the other nodes that have the same parent. For example, the siblings of node B are nodes C and D.

To compute the depth of a node, you can count the number of edges from the root node to the node in question. For example, the depth of node B would be 1, as there is 1 edge between the root node and node B.  For example, for node A, the parent node is the root node.

To know more about node visit:

https://brainly.com/question/30885569

#SPJ11

For each node in the tree of Figure 4.74, we can determine the parent node, list the children, list the siblings, compute the depth, and compute the height. The parent node, children, and siblings are determined by looking at the arrows connecting the nodes. The depth is determined by counting the number of edges from the root node to the current node, and the height is determined by finding the longest path from the current node to a leaf node.

The tree in Figure 4.74 consists of multiple nodes. Let's go through the questions step by step for each node:

a. To name the parent node, we look at the arrows pointing towards the current node. The parent node is the node from which the arrows originate. For example, if we are looking at Node A, the parent node is Node F.

b. To list the children, we look at the arrows pointing away from the current node. The children nodes are the ones that the arrows connect to. For Node A, the children nodes are Node B and Node C.

c. To list the siblings, we look at the children nodes of the parent node. For Node A, since the parent node is Node F and its children nodes are Node A, Node G, and Node H, the siblings of Node A are Node G and Node H.

d. To compute the depth, we count the number of edges from the root node to the current node. For example, the depth of Node A is 2 because we need to travel through two edges (Node F to Node A) to reach it.

e. To compute the height, we find the longest path from the current node to a leaf node. For Node A, the height is 3 because the longest path from Node A to a leaf node is A -> B -> D.

Therefore, for each node in the tree of Figure 4.74, we can determine the parent node, list the children, list the siblings, compute the depth, and compute the height. The parent node, children, and siblings are determined by looking at the arrows connecting the nodes. The depth is determined by counting the number of edges from the root node to the current node, and the height is determined by finding the longest path from the current node to a leaf node.

Learn more about parent node from the below link:

https://brainly.com/question/32089551

#SPJ11

For each node in the tree of Figure 4.74: a. Name the parent node. b. List the children. c. List the

Worksheet Identify the devices for moving the cursor around your computer screen

Worksheet Identify the devices for moving the cursor around your computer screen

Answers

Wouldn’t it just be the mouse

you are trying to push a memory module into a memory slot, but it is not seating properly. what is the most likely issue?

Answers

Assuming you are trying to push a memory module into a memory slot, but it is not seating properly, the most likely issue would be that: A) you are trying to install the memory module backwards in the memory slot.

What are the types of computer memory?

In Computer technology, there are two (2) main types of memory or storage location for software program (application) that are being used on a computer and these include the following;

Read only memory (ROM).Random access memory (RAM).What is RAM?

In Computer technology, RAM is an abbreviation for random access memory and it also referred to as a memory module or main memory. RAM can be defined as a volatile and temporary storage (memory) location that is used for currently opened software program (application) and computer data.

What is a memory?

A memory simply refers to a terminology that is used to describe the available space on an electronic device that is typically used for the storage of data or any computer related information such as the following:

VideosTextsMusicImagesCodesFolders

In conclusion, we can reasonably infer that a memory module would seat properly in a memory slot when it is installed in a backward.

Read more on memory here: brainly.com/question/24881756

#SPJ1

Complete Question:

You are trying to push a memory module into a memory slot, but it is not seating properly What is the MOST likely issue?

a)You are trying to install the memory module backwards in the memory slot.

b)You need to clear debris from the memory slot.

c)You need to push down the slot tabs and move them back.

d)You are trying to install a single-sided memory module in a double-sided slot.

How does decryption work?

Answers

Answer:

Decryption is the process of reversing an encryption. i.e The process which convert encrypted data into its original form

which of the following are true statements about how the internet enables crowdsourcing? i. the internet can provide crowdsourcing participants access to useful tools, information, and professional knowledge. ii. the speed and reach of the internet can lower geographic barriers, allowing individuals from different locations to contribute to projects. iii. using the internet to distribute solutions across many users allows all computational problems to be solved in reasonable time, even for very large input sizes.

Answers

The following statements are true about how the internet enables crowdsourcing are i & ii.

i. The internet can provide crowdsourcing participants access to useful tools, information, and professional knowledge.

ii. The speed and reach of the internet can lower geographic barriers, allowing individuals from different locations to contribute to projects.

However, the following statement is not true:

iii. Using the internet to distribute solutions across many users allows all computational problems to be solved in reasonable time, even for very large input sizes.

While the internet can allow for distributed computing and parallel processing, not all computational problems can be solved in a reasonable time, even with the power of crowdsourcing.

Some problems may still require significant resources, specialized hardware, or complex algorithms to be solved efficiently, regardless of the number of participants contributing.

For more question on crowdsourcing click on

https://brainly.com/question/14490967

#SPJ11

9. Alice Builds a Cache Complete the blanks in the following question with the appropriate answer. Alice P. Hacker has two types of memory that she's using to build his system in which to store her objects. The first type, type A, is extremely fast, but it's expensive and she doesn't have much of it. She has 10GB of type A memory that can being used to store A objects, and reading an object from this memory takes 1ms. The second type of memory, type Z, is a lot slower, but it's cheap, and so Alice bought a lot of it. She has 1TB of the second type of memory that she can use to store objects, and reading an object from this memory takes 100ms. Alice decides she's going to build a system where she keeps all of her objects in the second type of memory, and then also keeps copies of some of those objects in the first type so that she can do some of her reads more quickly. Alice has 2048 objects, all of the same size, which use up all of her second type of memory storage. Alice decides to analyze different ways to pick and choose what she keeps in her type A memory, and how they affect her expected object read performance. Please round all answers to 3 decimal places If Alice is naive and decides to randomly fill her type A memory with objects and never change it, what is her expected time to read 10 randomly selected objects out of the 2048 (in ms)? ms Alice now runs a workload where she reads 20 objects per minute. 50% of the objects she reads are objects she's seen in the past 30 seconds, and the other 50% of the objects are randomly chosen from the full 2048. Using the same naive strategy as before, what is her expected average read time for an object with this workload? ms Alice tries to improve her performance. She decides that every time she reads an object, if it is not in her type A memory, she will put it there. When she needs to remove something, she will remove the thing that she read least recently. What is Alice's average read time per object in the best case scenario? ms What is Alice's average read time per object in the worst case scenario? ms

Answers

If Alice is naïve and decides to randomly fill her type A memory with objects and never change it, her expected time to read 10 randomly selected objects out of the 2048 would be 50ms.

What is the Cache about?

With the workload of reading 20 objects per minute, where 50% of the objects are objects she's seen in the past 30 seconds, and the other 50% are randomly chosen from the full 2048, her expected average read time for an object with this naive strategy would be 75ms.

If Alice decides to improve her performance by putting an object in her type A memory every time she reads it and removing the least recently read object when she needs to remove something, in the best case scenario, her average read time per object would be 1ms.

Therefore, In the worst case scenario, her average read time per object would be 50.5ms.

Learn more about Cache from

https://brainly.com/question/6284947

#SPJ1

What are the major development that took place in the fourth generation of computer

Answers

Answer:

I'm going to assume they're talking about VLSI circuits. It allowed more transistors and circuits on a single chip. Made computers better in every way.

Answer:

Computers of fourth generation used Very Large Scale Integrated (VLSI) circuits. VLSI circuits having about 5000 transistors and other circuit elements with their associated circuits on a single chip made it possible to have microcomputers of fourth generation.

PLS MARK ME BRAINLIEST

Explanation:

who developed vacuum tube and when?​

Answers

Answer:

In 1904, John Ambrose Fleming invented the first vacuum tube.

Explanation:

Jon Ambrose Flemming invented the vacuum tube in 1904

(Java)
The extends keyword is used to:

a. to copy a parent class

b. to get access to methods and constructors of a parent class

c. make an int longer

Answers

The answer is c your welcome
ASMWER is 2
Because u wouldn’t want to copy a parent class for sure so that’s out of the option!

1-DESIGN TAB....................2-LAYOUT TAB .

1-wordart styles,

2-table size,

1-Table styles,

2-alignment,

1-draw borders,

2-rows and columns

1-DESIGN TAB....................2-LAYOUT TAB . 1-wordart styles,2-table size,1-Table styles,2-alignment,1-draw

Answers

design tab

wordart stylestable stylesdraw border

layout tab

table sizerows and columnsalignment

Answer:

The person above is correct.

Explanation:

1-DESIGN TAB....................2-LAYOUT TAB . 1-wordart styles,2-table size,1-Table styles,2-alignment,1-draw

The AND operator outputs true except where both inputs are false.

True
or
False

Answers

Answer:

true both have to be true for it to have output

Other Questions
what u.s. general was in charge of leading the army to invading southern mexico from texas? in which of the following scenarios would an app be subject to the health insurance portability and accountability act (hipaa)?the app supports a marketing application for a new usage in an fda-regulated product.the app stores or transmits protected health information (phi) in a hipaa-covered entity.the app collects identifiable data from subjects.the app stores financial data in a hipaa-covered entity. near the turn of the 20th century, artists in vienna formed a progressive alliance called: The question In the picture Do you think the conflict in Ukraine will likely drag on for months? Explain your answer. when during the cell cycle are chromosomes visible? question 26 options: a. only during interphase b. only when they are being replicated c. only during cell division d. only during the g1 phase Consider the following.f(x) = {1,Lx<0,0,0x<L;f(x + 2L) = f(x)\Find the Fourier series for the given function. Emily wanted to see what battery lasted the longest. She put each battery into a clock and recorded the time that the clock stopped. She used Duracell, Energizer, Kroger brand, and EverReady. Iv,Dv, Control, consistent How can an understanding of digital marketing and social media strategies helped companies gain a competitive Advantage and choose a right decision it comes to customer relationships management? You are an intern at a local animal sanctuary. one of your tasks is to record how many pounds of bamboo the pandas consume daily for 10 days. write a program to calculate and print the average weight based on the data. before calculating the average, you decide to throw out the lowest and highest values. your program should do the following: declare and initialize the array with the recorded weights such as 43.1 determine the maximum and minimum values in the array compute the average of the array contents, excluding the maximum and minimum values print the values in the array, excluding the maximum and minimum values print the average An ion accelerates from rest through a potential difference of 120. V and gains kinetic energy of 240 eV. What is the electric charge of the ion? PLEASEE HELPPP ME its due January 11th I really need helppp please For a given level of money and real GDP, an increase in velocity would lead to an increase in the price level. Select one: True False. Answer this easy geometry question the number of people an area can support on a sustained basis, given the prevailing technology is known as the The number of students at Jefferson School is even.The number has three digits.The digit in the tens place is 4.Write three numbers that could be how many studentsthere are at Jefferson School.school Identify the three main sources of cash flows over the life of a typical project. Calculate the mole fraction of ki in a solution made by dissolving 3. 4 g of ki in 5. 8 g of water. g The resistance of the wire in the windings of an electric starter motor for an automobile is 2.40 10-2 . The motor is connected to a 13-V battery. What current will flow through the motor when it is stalled (does not turn) if someone owns a dog, what is the percentage chance that they watch fox news? what if they own a cat?