A pentagon has ____ corners.

A. three
B. four
C. five
D. six


Answer: C

Computer Science & Information Technology

You might also like to view...

Modify the FAQ page to retrieve and present the information from table faq of the database storefront2k.mdb. The faq table contains two fields: question and answer.

What will be an ideal response?

Computer Science & Information Technology

If you are using a Unix or Linux operating system, you must include the ____ option when compiling a C program that uses the mathematical functions like log and sqrt.

A. -lm B. -l math.h C. -math D. -lib = math

Computer Science & Information Technology

The term _____ describes the steps an organization takes to protect information sought by "hostile" intelligence gathers.

a. data loss prevention b. trade secret c. counterintelligence d. competitive intelligence

Computer Science & Information Technology

Coil-type and box-type instructions are both types of ____________________ instructions.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology