Answer:
17.0
Explanation:
after first loop numA = 0.0 + 2 = 2.0
after second loop numA = 2.0 + 5 = 7.0
after third loop numA = 7 + 10 = 17.0
A time stamp indicates the date and time that a measurement was taken. A data scientist has a list containing 10,000 time stamps, sorted in chronological order. Which of the following is closest to the maximum number of values that will need to be examined when performing a binary search for a value in the list?
a. 10
b. 15
c. 5000
d. 10000
When performing a binary search for a value in the list of 10,000-time stamps sorted in chronological order, the maximum number of values that will need to be examined is closest to 14 or 15. Hence, the correct option is option B.
What is binary search?A binary search is a process used to find the position of a target value in a sorted list of data elements. To accomplish the task of finding the location of an element in a sorted array, the binary search method begins by testing the element in the middle of the array.
If this item is greater than the search value, the algorithm continues the search in the lower half of the array. If the element is smaller than the search value, the search continues in the upper half of the array. The search proceeds by halving the array again and again, until the element is found or the remaining array to be searched has been reduced to zero.
Binary search has a worst-case performance of O(log n), where n is the number of items in the array, indicating that the algorithm runs in time proportional to the logarithm of the number of items in the array. This is why it is frequently known as a logarithmic search.
Learn more about Binary Search at https://brainly.com/question/26693310
#SPJ11
What are some of the options available when previewing a worksheet before printing? Check all that apply.
applying styles
adjusting margins
inserting images
zooming in and out
navigating through pages
adding functions
Answer:
applying style to the worksheet before printing
explain what led to the invention of lasers
Answer:
The laser is an outgrowth of a suggestion made by Albert Einstein in 1916 that under the proper circumstances atoms could release excess energy as light—either spontaneously or when stimulated by light.
Explanation:
The laser is an outgrowth of a suggestion made by Albert Einstein in 1916 that under the proper circumstances atoms could release excess energy as light—either spontaneously or when stimulated by light. German physicist Rudolf Walther Ladenburg first observed stimulated emission in 1928, although at the time it seemed to have no practical use.
In 1951 Charles H. Townes, then at Columbia University in New York City, thought of a way to generate stimulated emission at microwave frequencies. At the end of 1953, he demonstrated a working device that focused “excited” (see below Energy levels and stimulated emissions) ammonia molecules in a resonant microwave cavity, where they emitted a pure microwave frequency. Townes named the device a maser, for “microwave amplification by the stimulated emission of radiation.” Aleksandr Mikhaylovich Prokhorov and Nikolay Gennadiyevich Basov of the P.N. Lebedev Physical Institute in Moscow independently described the theory of maser operation. For their work all three shared the 1964 Nobel Prize for Physics.
An intense burst of maser research followed in the mid-1950s, but masers found only a limited range of applications as low-noise microwave amplifiers and atomic clocks. In 1957 Townes proposed to his brother-in-law and former postdoctoral student at Columbia University, Arthur L. Schawlow (then at Bell Laboratories), that they try to extend maser action to the much shorter wavelengths of infrared or visible light. Townes also had discussions with a graduate student at Columbia University, Gordon Gould, who quickly developed his own laser ideas. Townes and Schawlow published their ideas for an “optical maser” in a seminal paper in the December 15, 1958, issue of Physical Review. Meanwhile, Gould coined the word laser and wrote a patent application. Whether Townes or Gould should be credited as the “inventor” of the laser thus became a matter of intense debate and led to years of litigation. Eventually, Gould received a series of four patents starting in 1977 that earned him millions of dollars in royalties.
The Townes-Schawlow proposal led several groups to try building a laser. The Gould proposal became the basis of a classified military contract. Success came first to Theodore H. Maiman, who took a different approach at Hughes Research Laboratories in Malibu, California. He fired bright pulses from a photographer’s flash lamp to excite chromium atoms in a crystal of synthetic ruby, a material he chose because he had studied carefully how it absorbed and emitted light and calculated that it should work as a laser. On May 16, 1960, he produced red pulses from a ruby rod about the size of a fingertip. In December 1960 Ali Javan, William Bennett, Jr., and Donald Herriott at Bell Labs built the first gas laser, which generated a continuous infrared beam from a mixture of helium and neon. In 1962 Robert N. Hall and coworkers at the General Electric Research and Development Center in Schenectady, New York, made the first semiconductor laser.
While lasers quickly caught the public imagination, perhaps for their similarity to the “heat rays” of science fiction, practical applications took years to develop. A young physicist named Irnee D’Haenens, while working with Maiman on the ruby laser, joked that the device was “a solution looking for a problem,” and the line lingered in the laser community for many years. Townes and Schawlow had expected laser beams to be used in basic research and to send signals through air or space. Gould envisioned more powerful beams capable of cutting and drilling many materials. A key early success came in late 1963 when two researchers at the University of Michigan, Emmett Leith and Juris Upatnieks, used lasers to make the first three-dimensional holograms (see holography).
Helium-neon lasers were the first lasers with broad commercial applications. Because they could be adjusted to generate a visible red beam instead of an infrared beam, they found immediate use projecting straight lines for alignment, surveying, construction, and irrigation. Soon eye surgeons were using pulses from ruby lasers to weld detached retinas back in place without cutting into the eye. The first large-scale application for lasers was the laser scanner for automated checkout in supermarkets, which was developed in the mid-1970s and became common a few years later. Compact disc audio players and laser printers for personal computers soon followed.
7. Explain the difference between register-to-register, register-to-memory, and memory-to-memory instructions.
Register-to-register instructions involve data manipulation between registers, register-to-memory instructions involve transferring data between registers and memory, and memory-to-memory instructions involve data manipulation between memory locations.
The difference between register-to-register, register-to-memory, and memory-to-memory instructions lies in the source and destination of the data being manipulated by the instructions.
1. Register-to-register instructions: These instructions involve data transfer or operations between two registers. In this case, the source data is stored in one register, and the result is stored in another register. Register-to-register instructions are typically faster than other types of instructions because they operate solely within the CPU's registers. For example, if we have the instruction "add r1, r2," it means that the contents of register r1 and r2 are added, and the result is stored back in register r1. 2. Register-to-memory instructions: These instructions involve data transfer between a register and a memory location. The source data is located in a register, and it is stored in a memory location specified by an address. Similarly, the destination data is retrieved from memory and stored in a register. For instance, the instruction "store r1, [r2]" means that the content of register r1 is stored in the memory location specified by the address stored in register r2.
3. Memory-to-memory instructions: These instructions involve data transfer or operations between two memory locations. The source data is retrieved from one memory location, and the result is stored in another memory location. Memory-to-memory instructions are typically slower than register-based instructions because they involve memory access, which is comparatively slower than register access. An example of a memory-to-memory instruction is "mov [addr1], [addr2]," where the contents of the memory location specified by addr2 are moved to the memory location specified by addr1.
Learn more about memory here: https://brainly.com/question/30925743
#SPJ11
Dharma opens one window, does a little work, closes the window, and then opens a new one. Instead of opening and closing windows, what can Dharma do to work more efficiently?
Group of answer choices
a. Point to the title bar of the open window, and then drag the window to a new location.
b. Point to a border or corner of the window, and then drag the resizing pointer to make the window smaller or larger.
c. Click the Minimize button to reduce the window to an icon on the taskbar, and then click the taskbar icon to redisplay the window.
d. Close all windows except one, and then click the Maximize button on the remaining window.
Instead of constantly opening and closing windows, Dharma could try using tabs in their web browser or document editor to keep multiple tasks open within one window.
They could also utilize keyboard shortcuts to switch between open windows more quickly. Another option would be to prioritize tasks and complete them in batches, rather than constantly switching back and forth between different windows. Additionally, taking breaks and practicing mindfulness techniques can help increase focus and productivity. Ultimately, finding a workflow that works best for their individual needs and preferences can greatly improve Dharma's efficiency.
learn more about web browser here:
https://brainly.com/question/31200188
#SPJ11
Write a program in java to input N numbers from the user in a Single Dimensional Array .Now, display only those numbers that are palindrome
Using the knowledge of computational language in JAVA it is possible to write a code that input N numbers from the user in a Single Dimensional Array .
Writting the code:class GFG {
// Function to reverse a number n
static int reverse(int n)
{
int d = 0, s = 0;
while (n > 0) {
d = n % 10;
s = s * 10 + d;
n = n / 10;
}
return s;
}
// Function to check if a number n is
// palindrome
static boolean isPalin(int n)
{
// If n is equal to the reverse of n
// it is a palindrome
return n == reverse(n);
}
// Function to calculate sum of all array
// elements which are palindrome
static int sumOfArray(int[] arr, int n)
{
int s = 0;
for (int i = 0; i < n; i++) {
if ((arr[i] > 10) && isPalin(arr[i])) {
// summation of all palindrome numbers
// present in array
s += arr[i];
}
}
return s;
}
// Driver Code
public static void main(String[] args)
{
int n = 6;
int[] arr = { 12, 313, 11, 44, 9, 1 };
System.out.println(sumOfArray(arr, n));
}
}
See more about JAVA at brainly.com/question/12975450
#SPJ1
Operating system manages hardware and software of a computer.
Answer:
OK
Explanation:
Please give me brainliest and thank me
Answer:
well for me I think it's
Explanation:
true because that's one of it's properties
Question 9 of 10
Which pair of devices work together to allow incoming and outgoing
communications between a predefined set of users?
The pair of devices that work together to allow incoming and outgoing communications between a predefined set of users are a router and a firewall.
What is a Router?A router is a network device that connects multiple networks together and forwards data packets between them. It is responsible for directing incoming and outgoing traffic between networks.
A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on a set of predetermined rules. It filters and blocks unauthorized access to the network and allows only authorized users to access the network.
Together, the router and firewall work to ensure that only authorized users can communicate with each other over the network. The firewall filters incoming and outgoing traffic based on the predetermined rules, while the router forwards the allowed traffic to its destination.
Read more about communications here:
https://brainly.com/question/25645043
#SPJ1
How the transaction may terminate its operation:
commit
rollback
stopping without committing or withdrawing its changes
be interrupted by the RDBMS and withdrawn
A transaction may terminate by committing its changes, rolling back and undoing its modifications, or being interrupted by the RDBMS (database management system) and withdrawn.
A transaction in a database management system (DBMS) can terminate its operation in different ways, including committing, rolling back, stopping without committing, or being interrupted by the RDBMS and withdrawn.
1. Commit: When a transaction completes successfully and reaches a consistent and desired state, it can choose to commit its changes. The commit operation makes all the modifications permanent, ensuring their persistence in the database. Once committed, the changes become visible to other transactions.
2. Rollback: If a transaction encounters an error or fails to complete its intended operation, it can initiate a rollback. The rollback operation undoes all the changes made by the transaction, reverting the database to its state before the transaction began. This ensures data integrity and consistency by discarding the incomplete or erroneous changes.
3. Stopping without committing or withdrawing: A transaction may terminate without explicitly committing or rolling back its changes. In such cases, the transaction is considered incomplete, and its modifications remain in a pending state. The DBMS typically handles these cases by automatically rolling back the transaction or allowing the transaction to be resumed or explicitly rolled back in future interactions.
4. Interrupted by the RDBMS and withdrawn: In some situations, the RDBMS may interrupt a transaction due to external factors such as system failures, resource conflicts, or time-outs. When interrupted, the transaction is withdrawn, and its changes are discarded. The interrupted transaction can be retried or reinitiated later if necessary.
The different termination options for a transaction allow for flexibility and maintain data integrity. Committing ensures the permanence of changes, rollback enables error recovery, stopping without committing leaves the transaction open for future actions, and being interrupted by the RDBMS protects against system or resource-related issues.
Transaction termination strategies are crucial in ensuring the reliability and consistency of the database system.
Learn more about database:
https://brainly.com/question/24027204
#SPJ11
Exercise 6.8.6: Totals of Lots of Rolls 5 points
Use the previous program that rolls a 6-sided die 100 times.
This time, instead of printing out the result of EACH roll, only print out the sum of the rolls for each number.
For example:
You rolled 24 ones.
You rolled 15 twos.
etc.
Write down the summary from one of the simulations to use in the next exercise.
Help plz
Answer: good luck
Explanation:
show the parse of (id) id using the lr algorithm (hint: shift-reduce algorithm) practiced in class.
Here's the parsing process for (id) id using the LR algorithm:
We start with an empty stack and the input string: (id) id$ (where $ is the end-of-input marker).
The initial state of the LR parsing table tells us to shift on the first token, (. So we shift this onto the stack and update our state to S1.
Stack: ( State: S1
Input: (id) id$
The next symbol in the input is id, so we shift this onto the stack and update our state to S4.
Stack: ( id State: S4
Input: ) id$
The next symbol in the input is ), which means we can reduce by the rule id -> LETTER, since there is only one symbol on top of the stack.
Stack: ( id State: S5
Input: ) id$
The LR parsing table tells us to reduce by the rule idList -> id, since we have just reduced id. This means we replace id on the stack with idList, giving us:
Stack: ( idList State: S6
Input: ) id$
The next symbol in the input is ), so we shift this onto the stack and update our state to S7.
Stack: ( idList ) State: S7
Input: id$
The LR parsing table tells us to reduce by the rule expr -> ( idList ), since we have ) on top of the stack and the previous rule was idList -> id. This gives us:
Stack: ( expr State: S8
Input: id$
The next symbol in the input is id, so we shift this onto the stack and update our state to S10.
Stack: ( expr id State: S10
Input: $
The next symbol in the input is $, which means we can reduce by the rule exprList -> expr, since there is only one symbol on top of the stack. This gives us:
Stack: ( exprList State: S11
Input: $
The LR parsing table tells us to reduce by the start symbol, prog -> exprList. Since exprList is the only symbol on top of the stack, we have successfully parsed the input string!
So the parse tree for (id) id would be:
prog
|
exprList
|
expr
/ \
/ \
( idList
|
id
Learn more about algorithm here:
https://brainly.com/question/21172316
#SPJ11
Phillip is using an optical device to look at the stars. He knows that it uses mirrors, but cannot remember its name. He is using a ......
refracting telescope
reflecting telescope
refracting microscope
reflecting microscope
EXPLAIN WHY YOU CHOOSE THAT ANSWER
Answer:
He is using a REFLECTING TELESCOPE.
Explanation:
A telescope is an optical instrument that is used by scientists or astronomers to view objects that are very faraway such as objects that are in space. For example: the galaxies, the stars, the moon, the planet e.t.c.
The mode of operation of a telescope is, a telescope makes use of either a lens or mirrors which are curved. This lens or mirrors focus the light rays from the faraway objects and uses them to form an image.
We have two types of telescopes.
a. Refracting Telescope: Another name for a refracting telescope is a refractor. The refracting telescope uses a lens to focus the rays of light and form an image.
b. Reflecting telescope: This is also called a reflector. It is different from the refracting telescope because it makes use of curved mirrors to focus the rays of light and form an image. The images formed by reflecting telescopes are very big and clear. Those images are also free from any form of abberation such as chromatic abberation.
From the above question, Phillip is using an optical device to look at the stars. He knows that it uses mirrors, but cannot remember its name. He is using a REFLECTING TELESCOPE. The reason for my answer is because it is said in the question that the optical device makes use of mirrors and it is only a reflecting telescope that uses mirrors.
The lifetime of a new 6S hard-drive follows a Uniform
distribution over the range of [1.5, 3.0 years]. A 6S hard-drive
has been used for 2 years and is still working. What is the
probability that it i
The given hard-drive has been used for 2 years and is still working. We are to find the probability that it is still working after 2 years. Let A denote the event that the hard-drive lasts beyond 2 years. Then we can write the probability of A as follows:P(A) = P(the lifetime of the hard-drive exceeds 2 years).By definition of Uniform distribution, the probability density function of the lifetime of the hard-drive is given by:
f(x) = 1/(b - a) if a ≤ x ≤ b; 0 otherwise.where a = 1.5 years and b = 3.0 years are the minimum and maximum possible lifetimes of the hard-drive, respectively. Since the probability density function is uniform, the probability of the hard-lifetime of a new 6S hard-drive follows a Uniform distribution over the range of [1.5, 3.0 years]. We are to find the probability that a 6S hard-drive, which has been used for 2 years and is still working, will continue to work beyond 2 years.Let X denote the lifetime of the hard-drive in years.
Then X follows the Uniform distribution with a = 1.5 and b = 3.0. Thus, the probability density function of X is given by:f(x) = 1/(b - a) if a ≤ x ≤ b; 0 otherwise.Substituting the given values, we get:f(x) = 1/(3.0 - 1.5) = 1/1.5 if 1.5 ≤ x ≤ 3.0; 0 the integral is taken over the interval [2, 3] (since we want to find the probability that the hard-drive lasts beyond 2 years). Hence,P(A) = ∫f(x) dx = ∫1/1.5 dx = x/1.5 between the limits x = 2 and x = 3= [3/1.5] - [2/1.5] = 2/3Thus, the probability that a 6S hard-drive, which has been used for 2 years and is still working, will continue to work beyond 2 years is 2/3.
To know more about Uniform distribution visit:
brainly.com/question/13941002
#SPJ11
por que se dice que las TIC´S son las integracion de las TI y las TC?
La respuesta correcta para esta pregunta abierta es la siguiente.
A pesar de que no se anexan opciones o incisos para responder, podemos comentar lo siguiente.
Se dice que las TIC´S son las integración de las TI y las TC porque ambas actividades se han integrado o fusionado en una solo concepto al momento de juntar las herramientas tecnológicas para almacenar, procesar y mandar información a través de los recursos tecnológicos utilizando los canales o recursos de los medios masivas de comunicación como lo son las redes satelitales o las comunicaciones vía microondas.
Al fusionarse las TI (Tecnologías de la Información) con las TC (Tecnologías de Comunicación), se maximiza la capacidad de enviar una mayor cantidad de información al momento a diferentes lugares del planeta.
How did the printing press make people more intelligent
Answer:
no
Explanation:
Answer:
the invention of the mechanical movable type printing press helped disseminate knowledge wider and faster than ever before.
Assume that chessboard has been declared to be a two-dimensional array of strings. Write a statement that instantiates an 8x8 array of strings and assign it to chessboard.
The statement that instantiates an 8x8 array of strings is chessboard = new String[8][8]
Explain what an array is:This arrays is a grouping of identically typed items that are stored in adjacent memory regions and may each be separately referred to via a reference to a special identifier. There is no need to declare five distinct variables when declaring an array of five int values (each with its own identifier).
What does the Excel term array mean?A formula with numerous computations capabilities on one or maybe more elements in an array is known as that of an array formula. An assortment can be thought of as a row, column, or mix of rows or columns of values.
To know more about Array visit:
https://brainly.com/question/19570024
#SPJ4
Explain how the ASCII and decimal versions are abstractions of the binary digits.
Answer:
A later version of ASCII called extended ASCII uses 8 digits long binary string giving it the ability to represent 256 different characters. ASCII includes, primarily, two types of characters, which are control characters (represented by 0-31 decimal and 127 decimal) and printable characters (represented by 32- 126 decimal).
Explanation:
if a can be row reduced to the identity matrix, then a must be invertible.
The given statement "if a can be row reduced to the identity matrix, then a must be invertible." is true becasue if a matrix A can be row reduced to the identity matrix, then A must be invertible.
The row reduction process, also known as Gaussian elimination, is a method for solving systems of linear equations and finding the inverse of a matrix. The goal of row reduction is to transform a matrix into its reduced row echelon form, which is a unique form that is row-equivalent to the original matrix and has certain properties, including having a leading coefficient of 1 in each row and having zeros below each leading coefficient.
If a matrix A can be row reduced to the identity matrix I, then A is said to be row equivalent to I. In this case, the row reduction process has transformed A into its reduced row echelon form, which has a leading coefficient of 1 in each row and zeros below each leading coefficient. This implies that the rows of A are linearly independent, and therefore, A has full rank.
Since A has full rank, it is invertible, which means that there exists a matrix B such that AB = BA = I, where I is the identity matrix. This is because A and B can be thought of as representing a linear transformation and its inverse, respectively, and a linear transformation is invertible if and only if it is one-to-one and onto, which is equivalent to having full rank. Therefore, if a matrix A can be row reduced to the identity matrix, then A must be invertible.
"
if a can be row reduced to the identity matrix, then a must be invertible.
True
False
"
You can learn more about identity matrix at
https://brainly.com/question/28177340
#SPJ11
Each time you use an object in a program, you must write the class program code from scratch.
True or False?
How does lower latency benefit the users connected to a network?
Users connected to a network benefit from lower latency "by reducing the delay when sending and receiving data between devices". The correct answer is C.
Lower latency refers to the amount of time it takes for data to be sent and received between devices on a network. When latency is low, the delay between when a user sends a request and when they receive a response is minimized, resulting in a more responsive and smoother experience for the user. This is particularly important in applications such as online gaming, video conferencing, and real-time control systems, where fast response times are critical. A low-latency network allows for faster data transfer, which results in a better user experience.
This question should be provided with answer choices, which are:
(A) by expanding the range over which the network's signals are transmitted.(B) by enabling more devices to connect to the network at the same time.(C) by reducing the delay when sending and receiving data between devices.(E) by limiting network access to users with higher security credentials.The correct answer is C.
Learn more about high latency here: brainly.com/question/30185656
#SPJ4
Which tab allows you to review the slideshow timings?
O Home
O View
O Review
O File
Answer:
view
Explanation:
The ultrasonic spatula device is used for all of the following skin conditions EXCEPT: a. dull b. aging c. congested d. dehydrated.
The ultrasonic spatula device is used for all of the listed skin conditions except for dull.
The device is effective in treating several skin conditions, including dull, aging, and congested skin. However, it may not be the best option for dehydrated skin. This is because the ultrasonic vibrations can potentially strip the skin of its natural oils, which can further exacerbate dryness and dehydration.
If an individual has dehydrated skin, it is recommended that they focus on using gentle, hydrating skincare products that nourish and moisturize the skin. This may include using a hydrating serum or moisturizer, drinking plenty of water, and avoiding harsh exfoliants or treatments that can further dry out the skin.
For more questions on dehydration:
https://brainly.com/question/29655269
#SPJ11
Except for congested conditions, the ultrasonic spatula device is useful for all of the above skin problems.
How is this so?The gadget may cure a variety of skin issues, including dull, aging, and congested skin. It may not, however, be the ideal solution for dehydrated skin. This is because ultrasonic vibrations have the ability to deplete the skin of its natural oils, exacerbating dryness and dehydration.
If a person has dehydrated skin, it is advised that they use moderate, hydrating skincare products that feed and moisturize the skin. Using a hydrating serum or moisturizer, drinking enough of water, and avoiding harsh exfoliants or procedures that might further dry up the skin are all examples.
Learn more about ultrasonic spatula :
https://brainly.com/question/3193802
#SPJ1
Clicking the Print button on the Backstage Print screen sends the document straight to the currently selected
printer with the default settings.
True
O False
The simple answer to this odd question is True.
Use the table on the right to convert from decimal to binary.
The decimal value of binary 1000 is 10.
The decimal value of binary 1100 is 12.
The decimal value of binary 1001 is 11.
The decimal value of binary 1110 is E.
Answer:
The decimal value of binary 1100 is 12
Explanation:
on edge
outline the steps involved in changing the colour of a theme
Answer:
Right click on the desktop and click on personalize option and then click on window color. After that window color and appearance window appears. select a color scheme you want. Go to Appearance and personalization, click on theme and select any theme from the list and click on ok.
which of the following code segments can replace /* missing code */ so the gettotal method works as intended? for (int x = 0; x < (); x ) { total = (x).getnum(); }
To make the `gettotal` method work as intended, the missing code segment should be replaced with `x < getSize()`, where `getSize()` returns the total number of elements in the collection.
How can the missing code segment be replaced to ensure the `gettotal` method functions correctly?The missing code segment in the given question should be replaced with `x < getSize()` to make the `gettotal` method work as intended. This replacement ensures that the loop iterates until the value of `x` is less than the total number of elements in the collection. By using the `getSize()` method, which returns the size of the collection, the loop will iterate over each element and accumulate the total by calling the `getnum()` method on each element. This replacement guarantees that the `gettotal` method correctly calculates the total value based on the elements in the collection.
In summary, replacing the missing code segment with `x < getSize()` allows the `gettotal` method to iterate over all the elements in the collection and calculate the total as intended. This ensures the method functions correctly and provides the desired result.
Learn more about code segment
brainly.com/question/30825008
#SPJ11
Which program runs on a computer when the computer boots up?
An operating system runs on a computer when the computer boots up.
Basically, operating systems are used to run programs like browsers and video players.
Some examples of operating systems:
Windows LinuxAndroidmacOSHope this helps :)
Answer:
Operating system
Explanation:
Which of these is the best option for a file name to be linked to on the web?
A At the Concert.pdf
B REMIND theConcert.pdf
C At-the-Concert.pdf
D At+the+Concert.pdf
The best option for a file name to be linked to on the web is C At-the-Concert.pdf
What is the definition of HTML?A web page's structure and content are organized using HTML (HyperText Markup Language) code. For instance, content could be organized using paragraphs, a list of bullet points, images, and data tables.
Note that the index. HTML is the text and images that visitors see when they first visit your website are typically contained in this file. One can make a new index file in your text editor. Save it as HTML only, in the test-site folder such as At-the-Concert.pdf.
Learn more about file name from
https://brainly.com/question/26960102
#SPJ1
write an algorithm to find the perimeter of rectangle
Answer:
look at the link i put down below
Explanation:
how computer viruses spread from one computer to another