a character that
is raised and smaller above the baseline is called​

Answers

Answer 1

Answer:

A character that  is raised and smaller above the baseline is called​ a superscript.

Explanation:

A character that  is raised and smaller above the baseline is called​ a superscript.

For example, let 'a' be the number and 'n' is the exponent power of the number 3.

aⁿ

The number 'n' above the number 'a' is an example of a superscript.

In another example, let the expression be

4⁶

The number 6 above the number 4 is an example of a superscript.

Therefore, we conclude that a character that  is raised and smaller above the baseline is called​ a superscript.


Related Questions

Select the statement below that would most likely appear in a description of the Link-State routing protocol. Assume the referenced routers are all part of the same network: Group of answer choices Each router talks, sends updates, to all other routers on the network Each router only talks, sends updates, to its neighbors Each router will be controlled by a large master router All of the above

Answers

Answer:

Each router only talks, sends updates to its neighbors

Explanation:

There are two types of routing protocol, they are, link-state and distance-vector routing protocol. The link-state protocol is performed by nodes or routers prepared for packet switching. Each node is responsible for mapping out the route of the network, using the reachability protocol to assert the connectivity to neighboring nodes, updating its route and sending the link-state update messages periodically to neighboring nodes.

find the error in the statement below

if height _variable >59;

print ("you can ride this roller coaster.")​

Answers

Since this code is in python, you have to follow python syntax.

All if statements must end with a colon not a semi colon. For instance,

if height_variable > 59; should be if height_variable > 59:

Also, the print statement should be indented into the if statement.

if height_variable > 59:

   print("you can ride this roller coaster.")

Which file format should Wilson use for sending these images?

Answers

I can’t see the answer choices but I would like to say it’s JPEG am not sure. Could you at least provide the answer choices? Thanks!
JPEG I assume, please leave more context clues next time

Evaluate a career in the telecommunications industry that most interests you. What about the career appeals to you?
What qualifications do you already possess to make you successful in this career? Which skills do you still need to
develop to pursue this career?
Your answer should be at least 150 words in length.

Answers

Answer:

Network administrator and programmer.

Am still in A-level, am doing Physics, chemistry, Maths and ICT.

I have an A in physics, B in Chemistry and Maths and A† in ICT

Which of the following has the greatest impact on telecommunications design?

cost of materials used in manufacturing

availability of resources used in manufacturing

consumer functionality demands


currently trending fashion designs

Answers

Answer:

A

Explanation:

Hope Brainly understood

Answer:

consumer functionality demands

Explanation:

edg2021

In other words, the design is based on what the consumers want (their demands) and how well the design they choose works and fuctions

Design innovation has come a long way in a few years, and it shows no signs of slowing down. Tablets with detachable keyboards, smartphones with better cameras, and more versatile touch screen capability on everything all require technical design and engineering professionals. Along with the technical features, designers must create a device that’s sleek, appealing to consumers, and easy to use, but also rugged enough to survive being dropped, sat on, exposed to water, and dirty. Just as great car design is a successful mix of form and function, design is a major factor in a device’s popularity and sales.

Consider six memory partitions of 128 KB, 512 KB, 192 KB, 256 KB, 512 KB, and 448 KB (in order). How would each of the first-fit and best-fit algorithms place processes of 210 KB, 420 KB, 110 KB, 450 KB, and 76 KB (in order)

Answers

Answer:

Following are the solution to the given question:

Explanation:

Please find the image file in the attachment.

The first fit (FF) System for both the allocation for capital for the first attach appends information to just the memory through scanning the very first space, that's at least wide enough to accommodate the data, from the start. So space is allocated to information.

Its best solution is to allocate the least stable division which meets the challenging performance effects. It assessment searches throughout the whole list of free partition for the very first time, taking into account the smallest appropriate hole. It tries to find another whole near the process required size.

Which one of the following choices identifies employer-sponsored health insurance?

a. NPI
b. CMP
c. NDC

Answers

Answer:

The answer is option A "NPI"

Explanation:

* The National Provider Identifier (NPI) is a Health Insurance Portability and Accountability Act (HIPAA) Authoritative simpleness Standard. The NPI is an unique ID number for covered medical services suppliers. Covered medical care providers and all well being plans and medical services clearing houses should use the NPIs in the managerial and monetary exchanges received under Health Insurance Portability and Accountability Act.

* The NPI is a 10-digit, insight free numeric identifier (10-digit number). This implies that the numbers don't convey other data about medical care providers, for example, the state in which they live or their clinical strength. The NPI should be used in lieu of inheritance supplier identifiers in the Health Insurance Portability and Accountability Act principles exchanges.

* In the US and different nations that don't have national health systems, employers frequently offer medical coverage as an advantage to workers.

The person who created the Internet is called​

Answers

Answer:

Vinton Cerf and Bob Kahn

Explanation:

Computer scientists Vinton Cerf and Bob Kahn are credited with inventing the Internet communication protocols we use today and the system referred to as the Internet.

helpppp pleaseee thanksss​

Answers

Answer:

B!

Explanation:

i think... Here is an example

1. How many column can you insert in a MS Word in maximum?
A. 40
B. 45
C. 50
D. 55
2 What​

Answers

Answer:

63 columns

Explanation:

In Microsoft Word you can insert a table with up to 63 columns, that is the limit to the number of columns allowed in a Word document.

brainliest? plz!

Certification is a requirement in pursuing a career as a line installer.

True

False

Answers

Answer:

False

Explanation:

This is rue because, in line installation career, there is no single need for certification but rather to acquire the required skill.

The ability to learn how to be a line installer from an experienced personel is far important than someone who tried to obtain a certification without any acquired skilled to show for it.

Answer:

False

Explanation:

edg2021

Employer training or apprenticeships are required of electrical line installers and repairers. These programs often last up to five years. Certification is not mandatory; however, certification for line installers and repairers is available and does show that you have the right skills and knowledge for this technical job. Often learning on the job is the best way to get experience in this type of position, but it still requires basic understanding of equipment, data communications, and the physical layer of a network.

If an element contains text or another element, it is marked using a ______tag set in which an opening tag and a closing tag enclose the element content.

a. single-sided
b. two-sided
c. one-sided
d. double-sided

Answers

Answer:

b. two-sided

Explanation:

If an element contains text or another element, it is marked using a two-sided tag set in which an opening tag and a closing tag enclose the element content.

For example, <p>it is very important to "check" the expiration date of goods before buying them.</p>. In this scenario, the <p> represents the opening tag while the </p> represents the closing tag in HTML programming.

Derek is creating an animation for his class project. What is the first step Derek should follow while creating the animation?
A. storyboarding
B. preparing a script
C. adding voices to the animation
D. choosing an animation tool

Answers

Answer:

1. Script,2.Storyboarding,3.Choosing a Animation tool, 4. Adding voices to the animation

Explanation:

Script comes first since that you have to follow everything on there, then you have to make a illustration of the storyboard, then it comes to choosing which animation tool is better, and last but definitely not least is adding voices to that animation.

Answer: preparing a script

Explanation:

The Chief Information Officer (CIO) has determined the company’s new PKI will not use OCSP. The purpose of OCSP still needs to be addressed. Which of the following should be implanted?A. Build an online intermediate CA.B. Implement a key escrow.C. Implement stapling.D. Install a CRL.

Answers

Answer:

B. Implement a key escrow.

Explanation:

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

In this scenario, the Chief Information Officer (CIO) has determined the company's new public key infrastructure (PKI) will not use online certificate status protocol (OCSP). However, the purpose of online certificate status protocol (OCSP) still needs to be addressed. Thus, what should be implemented is a key escrow because the online certificate status protocol (OCSP) is an internet protocol used for maintaining the security of a server and obtaining a digital certificate that has been revoked.

In a List of Positive Integers, Set MINIMUM to 1. For each number X in the list L, compare it to MINIMUM. If X is smaller, set MINIMUM to X.” Read this STATEMENT very carefully and Answer the below Questions.

A. Will this Algorithm RUN?? Yes or No with a justification

B. Will X Replace Any Value or Not?

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The given problem scenario is:

In a List of Positive Integers, Set MINIMUM to 1. For each number X in the list L, compare it to MINIMUM. If X is smaller, set MINIMUM to X.

The answer to question A is: this algorithm will not run because:

If you a list of a positive number and you have already set it MINIMUM to 1, the comparison result with MINIMUM will not obtain. For example, lets suppose a list of numbers L. L={1,2,3,1,1,5,4,3,2}. You have already set the Minimum to 1. When you compare each number X in the list, if X >MINIMUM, then set MINIMUM to X.  

This will not work, because there are positive numbers in the list and the minimum positive number is 1. So the algorithm, will not execute the if-part.

In short, the pseudo-code of this problem is given below:

L={list of positive number e.g. 1,2,3,.......Xn}

MINIMUM=1

foreach ( X in L)

{

(if X<MINIMUM)

   {

       MINIMUM=X

   }

}

The answer to question B is X will not be replaced because X  replaced with MINIMUM only when if-part of this algorithm get executed. However, it is noted that X will not replace any value, if if-part will get executed, the Variable MINIMUM will get replaced with any value.

If you're a beginner to data analysis, what is the first thing you should check when you build data queries?
a. workflow diagrams
b. calculations
c. differentials
d. record counts

Answers

D. Record Counts, trust me I took notes on this and it’s also in my quizlet

George wanted to make his website more interactive. He decided to create animation for his website. Which software can George consider to design this animation?

A. Reaper
B. Vegas Pro
C. Flash
D. Audacity
E. Quark Xpress

Answers

Answer:

C. Flash

Explanation:

Adobe Flash is a discontinued multimedia software platform used for production of animations, Rich web applications, desktop applications, mobile apps, mobile games, and embedded web browser video players. Flash displays text, vector graphics, and raster graphics to provide animations, video games, and applications.

-Wikipedia

Answer:

C.Flash

Explanation:


on the surface of a magnetic disk fragmentation occurs when file is stored in non-contigious sectors on the disks surface?

Answers

manyetik disk parçalanması, dosya disk yüzeyinde bitişik olmayan sektörlerde depolandığında meydana gelir.

From 1995 to 1997, the number of web users

Doubled
Tripled

Quadrupled

Remained the same

Answers

Quadrupled. I think sorry if you get it wrong i do not remember much
Yup it quadrupled in 1997

(Comparable interface) Write Rectangle class that implements the Comparable interface. Override the equals method so that two Rectangle objects are equal if their areas are the same.

Answers

Answer:

class Rectangle(object):

   def __init__(self, area):

       self.area = area

   def __eq__(self,other):

       return self.area == other.area

d = Rectangle(43)

e = Rectangle(23)

print(d == e)

Explanation:

The python program defines a class called Rectangle that accepts one argument 'area' and compare one instance of the object with another instance. The '__eq__' method helps to define the equality of the instance based on their area values. If the areas are equal, the equality statement returns true and false if not.

Neil notices that a single address is generating traffic from its port 500 to port 500 of several other machines on the network. This scan is eating up most of the network bandwidth and Neil is concerned. As a security professional, what would you infer from this scan

Answers

Answer:

It means that the attacker want to determine the type of VPN Implementation and checking for IPSec

Explanation:

VPN means Virtual Private Network and is deployed to share infrastructure with the same access or security policies as a private network among multiple sites.

help with these 2 questions srry for the horrible pic​

Answers

Answer:

the first one is email address nd the second one is semi-blocked letters ? sorry if im wrong.

Explanation:

Answer:

I cant read

Explanation:

Identify the potential problem(s) involved with generating or collecting valid data.
A. Cost.
B. Bias.
C. Error.
D. Access to data.
E. All of the above.
F. None of the above.

Answers

Answer:

B. Bias.

C. Error.

Explanation:

Two of the biggest problems that can occur when generating or collecting valid data are Bias and Errors. Biases automatically make the collected data invalid since this causes the data those involved to purposefully skew the data towards the direction that best suits their biases/beliefs which makes the entire study invalid and therefore the data as well. The second main problem would be human error such as entering the wrong data numbers, choosing the wrong subject, losing the data itself, etc. Humans make mistakes and making one during a study can immediately invalidate all of the data that has been collected.

Universal Containers (UC) wants to customize basic Salesforce Reports using Lightning Experience. In which two ways can Reports be customized? Choose 2 answers v A. Add a chart. B. Add a Lightning Component. C. Add links to external pages. D. Add a filter.

Answers

Answer:

A. Add a chart.

D. Add a filter.

Explanation:

Workflow management systems can be defined as a strategic software application or program designed to avail companies the infrastructure to setup, define, create and manage the performance or execution of series of sequential tasks, as well as respond to workflow participants.

An example of a work management system is Salesforce.com.

A Salesforce Reports using Lightning Experience refers to an intuitive and powerful software tool used for visualizing and analyzing Salesforce data such as customization, filtering, grouping and creating a summary report.

In this scenario, Universal Containers (UC) wants to customize basic Salesforce Reports using Lightning Experience.

Hence, the two ways in which Reports can be customized are by adding a chart and a filter.

Suppose a webpage contains a single text field. We want to make the page such that a user can immediately start typing in the text field without clicking on it. What is correct way using?
1. .
2. .
3. .
4. Can't be done with only HTML5, need help of Javascript or something else.

Answers

Answer:

The answer is "Option 2".

Explanation:

In HTML5, text inputs use an autofocus attribute, which, when the page is loaded, uses a template to concentrate primarily on text fields. This attribute is a Boolean property that represents the HTML autofocus attribute, showing if the related <select> element will receive an output focus whenever the page loads if it is overruled by the user. An only form-associated entity can have this property specified in a text.

We have discussed four approaches to dealing with moral issues. Which approach is closest to your way of analyzing moral issues? Now that you are aware of different approaches, do you think you might modify your approach to include other perspectives? Explain why or why not.

Answers

Answer:

The four approaches are: The principle approach, in which decisions are made according to a principle such as the Ten Commandments or the Golden Rule The consequence approach, in which decisions are made according to their likely outcomes The virtue/character approach, in which decisions are made according to the ...

Repeated execution of a set of programming statements is called repetitive execution.

a. True
b. False

Answers

Answer:

False

Explanation:

A business owns a printer but the printer is used for cloud printing purposes. What type of resource is this?

Answers

I’m confused , what are the choices ?

define an array of 12 structures of type DayMon. Name the array maps[] and initialize the array with the names of the 12 months in a year and the number of days in each month.

Answers

Answer:

#include<stdio.h>

int main(){

 

   int i,n;

   char* maps[] = {"January", "February", "March", "April", "May", "June", "July", "August", "September", "October", "November", "December"};

   for(i=0;i<12;i++){

       printf("%s\n", maps[i]);

   }

   printf("\n");

 

   int days[] = {31,28,31,30,31,30,31,31,30,31,30,31};

   for(i=0;i<12;i++){

       printf("%s %d\n", maps[i], days[i]);

   }

   printf("\n");

 

   return 0;

}

Explanation:

The C source code above declares two arrays, the maps array which is initialized with the months of the year and the days array which is initialized with the number of days of each month in the maps array. Both arrays are printed out side by side like a table of months and the days in each month.

It seems like no matter what I do this code is still giving me the error "
Program end never reached (commonly due to an infinite loop, infinite recursion, or divide/mod by 0).
Tests aborted"
import java.util.Scanner;
public class DivideByTwoLoop {
public static void main (String [] args) {
int userNum = 0;
userNum = 20;
while(userNum >= 1){ System.out.print(userNum + " ");
userNum = userNum/2;
}
if((userNum >1) && !(userNum ==0)){
System.out.print(userNum);
} else {
}
while(userNum !=0) System.out.print(userNum + " ");
System.out.println("");
return; }
}

Answers

Explanation:

I ran this on an online compiler with no issues, so I would try to use a different compiler if I were you. For example, sometimes the compiler can run a different program than the one you're currently on.

I would also recommend cleaning up the code. You don't need anything outside of the first part, as the latter 2 parts don't do anything because the number is already 0 by then.

Here's what I ended up with:

int userNum = 20;

       

       while(userNum >= 1){

           System.out.print(userNum + " ");

           userNum = userNum/2;

       }

       

       return;

My output is:

20 10 5 2 1

Other Questions
The heights of the starting players on each of two basketball teams are shown in the table below. Heights of Starters on Team A and Team B Team A 70 in. 72 in. 75 in. 68 in. 70 in. Team B 71 in. 73 in. 71 in. 72 in. 73 in. Jacob found that the mean height of Team A is 71 and the mean height of Team B is 72. He believes that because Team B has a greater mean, it also has a greater mean absolute deviation. Which explains Jacob's error? One of the means is incorrect, but the reasoning is correct. Both of the means are incorrect, and the reasoning is also incorrect. Both of the means are correct, but the reasoning is incorrect. O One of the means is incorrect, and the reasoning is also incorrect. In a radio, ______ energy is transformed into ______ energy. Plsss help I will mark brainlist Wanda around the world.How can the writer correct the fragment? A Add an adjective before "world" B Add a noun after "around" C Add a pronoun before "the" D Add a verb after "Wanda" Someone help me plz International Violence Before WWII Japan invades Manchuria 1931 Italy invades Ethiopia1935 Japan invades China 1937 Germany annexes Czechoslovakia Germany invades Poland 19391939Using the information provided in the timeline above, which historical conclusion can be drawn about thecause of World War 11? URGENT PLEASE HELP?!Which statement best describes the purpose of judicial review?O It limits the types of cases the Supreme Court can hear.It allows the Supreme Court to have original jurisdiction in some cases.O It mandates that state courts can overturn federal actions in their jurisdictions.O It provides a check on the power of the executive and legislative branches of government. What is the local minimum value of the function? (Round answer to thenearest hundredth)g(x) = x4 5x + 4Answer here 1. The part of plants that contains structures needed to absorb sunlight and carbon dioxide is the Fill in the blank text field 1. The cells inside this structure contain many green organelles called Fill in the blank text field 2. Inside each of these organelles are stacks of Fill in the blank text field 3 that contain the green pigment Fill in the blank text field 4 that absorbs sunlight needed to power the lightdependent reactions of photosynthesis. Can a line on a position-time graph have a negative slope? When a large hotel chain or cruise line groups people by the segment where they work: luxury, economy and so on, it is known as customer division.FalseTrue The Chief Information Officer (CIO) has determined the companys new PKI will not use OCSP. The purpose of OCSP still needs to be addressed. Which of the following should be implanted?A. Build an online intermediate CA.B. Implement a key escrow.C. Implement stapling.D. Install a CRL. Which of the following statements about main idea is true?The main idea is always stated explicitly.The main idea of an article is called the topic sentence.The main idea of a paragraph is called the thesis or thesis statement.Once the main idea is uncovered, the rest of the story should tie together and make understanding it much more simple. Find the perimeter of the polygon. Assume that lines which appear to be tangent are tangent. 7.78 rounded to the nearest ones A survey of over 7,000 randomly selected employees in 15 nations recently showed that employees who workin a digital workplace tended to be happier than those who don't work in a digital workplace.Can we conclude that working in a digital workplace caused employees to be happier? Why? Depression is a stage of grieving in which __________. A. one may feel hopelessness and despair B. it's normal to feel deep sorrow for the loss C. it's important to talk with others about your feelings D. all of the above Evaluate the extent to which the Thirty Years' War marked a change in the behavior of European monarchs, analyzing what changed and what stayed the same from the period before the war to the period after it. FOR THE BOOK FREDERICK DOUGLASSRead from the beginning of the chapter to the top of pg. 44 in text, pg. 64 in PDF.1. How is a man made into a slave? Explain what this means and how it happens. what is the domain and range Steam Workshop Downloader