Label the following website navigation methods
according to their importance, where 1 is most
important and 3 is least important.
Site map:
Navigation menu:
Site search:
Answer:
Technology is very important
Answer:
Site map: 3
Navigation menu:1
Site search:2
Explanation:
What important role is being described?
Completes the Action Item form.
Answer:
A sponsor is a member of congress who is willing to introduce and back the legislation. Explanation:
Which of the following is NOT a common type of mic:
A. Lavalier
B. Shotgun
C. Stick
D. Parabolic
E. Handheld
Answer:
Uhh all of them are mics
Explanation:
Which definition of levels of is correct?
O A. voltage at which an audio device receives sound
B.
volume at which someone plays audio on a device
OC. voltage at which a device plays audio
OD. frequency of sound waves alternating on a device
Answer:
D. frequency of sound waves alternating on a device
Explanation:
Answer:
frequency of sound waves alternating on a device
Explanation:
Where will a sprite On the Scratch website start at with coordinates (0,0)?
The answer to your question is stage center. Looking at the multiple choices, I think you should choose the answer, "the center of the screen". But I am not 100% sure if that's the right answer. Hope that helps.
Which of the following is NOT a benefit of pair-programming?
Code takes 15% less time to write than with a solo programmer.
Programs have fewer bugs than if written by a single programmer.
Code solutions are more creative.
o o
Bias in programs is reduced.
Answer:
Programs have fewer bugs than if written by a single programmer.
Explanation:
this is what I think personally
Coupled with risk reduction and knowledge sharing within an organization, pair programming is a key technique for producing faster, higher quality code. Thus, option B is correct.
What is the role pair programmer in the programs?Two programmers collaborate at the same workstation while using the agile software development technique known as pair programming.
The observer or navigator reads each line of code as it is entered while the driver, who is also the code writer, types it in.
Pair programming is a method where two programmers collaborate on the same block of code while using just one computer.
This introduces the idea of pair programming roles, where one performs the function of the driver (writing code) and the other that of the navigator (ensuring the accuracy of the code).
Therefore, Programs have fewer bugs than if written by a single programmer.
Learn more about pair programmer here:
https://brainly.com/question/14190382
#SPJ2
As of 2007, how many concentrated solar power plants did the United States have?
Answer:
12,718
Explanation:
Hope this helps! Let me know! :)
When people become more dependent on digital technology in their lives, the potential for data misuse will grow. Explain the above sentence in your opinion.
**Answer and I will give you brainiliest**
Answer:
yest that's correct.
Explanation:
for example we can see Artificial intelligence/AI the more it becomes super computer the future of human existence will be in jeopardy like in the movie Terminator.
some people will become lazy and don't use their brain for anything
Choose the comparison operator that will create a true statement in scratch
Answer:
the first one
Explanation:
think about it. 60 equals 60! this is true!
Answer:
A is correct
Explanation:
i took this same test
Which of the following job duties would a software developer perform?
A. developing a product that is easy to use and meets a customer’s need
B. establishing security procedures to protect important information
C. managing and securing data
D. writing the code to make a new application work
Answer:
Either B or D but I think mostly B cause it makes more sense
Answer:
A. developing a product that is easy to use and meets a customer’s need
Explanation:
lnao its easy
definitely not b or d
As a student, how can you sustain focus and attention with technology distracting you from things that matter (academic, personal relationships, community involvement)?
To be able to sustain focus and attention with technology distracting you, one can make sure that they have no social media account, have an analogue cell phone and no use of the TV regularly.
How is technology a distraction to students?The use of technology by college students have been found to have its usefulness as well as its effect on student.
The ways to stop Internet Distractions are:
Make up your mind on what Really Matters.Know that the use of Smartphone can support and be of issue to your Work.Turn Off Notifications. Deactivate your social media account.Conclusively, by doing the above, on can be able to stop technology Distractions.
Learn more about technology from
https://brainly.com/question/25110079
Which platforms are used for mobile apps? Select 4 options.
BlackBerry
Bluetooth
iOS
Android
Windows
Answer:
- Blackberry
- iOS
- Android
- Windows
Explanation:
On Edge, it states, "There are two main operating systems used on mobile phones, Android and iOS (the Apple platform). There are also apps for Windows and BlackBerry." (correct on Edge)
I hope this helped!
Good luck <3
Platforms used for mobile apps are
BlackBerryiOSAndroidWindowsWhat are Mobile Apps?On the mobile app, there are two main platforms namely iOS and Android.An application platform is defined as a framework of services that application programs on for standard operations. An application platform operates in five principal areas and they are development tools, execution services, data services, operating systems (OSes), and cloud services.Three mobile apps are Native Mobile AppsHybrid Mobile AppsWeb AppsReact Native is the most used cross-platform mobile app development framework.To learn more about Mobile apps refer to:
https://brainly.com/question/20366434
#SPJ
You are working as a security expert in an e-commerce enterprise. Your company recently decided on a short-term collaboration with a small business named BuyMe, and the following issue arose. Whenever your customers purchase any product from BuyMe, the e-commerce website redirects them to the BuyMe website, asking for additional authentication. This results in customers abandoning their purchases. To solve this issue, both enterprises agree to use a single authentication process wherein the users, once logged in to your website, can purchase from BuyMe without additional steps.
How should you implement this without storing the customers' credentials on the BuyMe server?
a. Use RADIUS authentication
b. Use Using Kerberos authentication
c. Use TACACS+
d. Use SAML
Answer:
Use TACACS+. IT IS THE BEST
Explanation:
IT IS THE BEST
Answer: Use SAML
Explanation:
How is advertising using social media different from using traditional advertising?
Answer: Social media marketing allows for more succesful and personalized messaging, but traditional marketing tactics are usually more static with a harder reach of audience.
a paragraph about the different types of college degrees
Answer:
There are four major categories of degrees available for postsecondary students. These college degrees in order of complexity are associate, bachelor's, master's, and doctoral degrees. Earning one of these degrees can take 2-8 years, depending on the level of the degree and field of study. Graduate-level university degrees may require students to complete one or more undergraduate programs prior to enrollment. When comparing different degrees, students can consider which program best fits their career goals and academic interests. Keep in mind that all college degrees require completion of a high school diploma first.
Explanation:
Mikayla is listening to music while she completes research for a school assignment. The input and output devices are able to communicate with each other because the computer has
central processing memory
a central processing unit
random access memory
read-only memory
Answer:
A central processing unit (CPU)
Describe about abacus
An abacus is a calculation tool used by sliding counters along rods or grooves, used to perform mathematical functions. In addition to calculating the basic functions of addition, subtraction, multiplication and division, the abacus can calculate roots up to the cubic degree.
Answer:
An abacus is a calculation tool used by sliding counters along rods or grooves, used to perform mathematical functions. In addition to calculating the basic functions of addition, subtraction, multiplication and division, the abacus can calculate roots up to the cubic degree.
Question:
How many hours do you spend on the Internet per day? Can you live without the Internet for a week? How many aspects of your life depend on the Internet? How many times have you complained about your Internet connection speed?
Answer:
Living with no internet is indeed a possibility and a reality for many.
It's virtually impossible to go without internet for a significant period of time. Not only do you miss out on social events, but your work suffers too. However, I'd also recommend logging off occasionally; even if just for a day or two.
Read articles offline.
Listen to podcasts offline.
Do a "brain dump" writing exercise.
Come up with a few weeks' worth of blog topics.
Interact with other humans.
Hold an impromptu staff meeting.
Take some time to relax.
Make some phone calls.
Explanation:
I spend around 6-8 hours on the Internet each day. This includes using it for work-related tasks, browsing social media, watching videos, reading news, and other online activities.
How many hours do you spend on the Internet per day?Can you live without the Internet for a week?
While you rely heavily on the Internet for work and communication, you believe you can manage without it for a week. However, it would require adjustments to your routine and finding alternative ways to handle tasks typically done online.How many aspects of your life depend on the Internet?
Numerous aspects of your life depend on the Internet. Apart from work-related tasks, you use it for staying connected with friends and family, online banking, shopping, accessing information, streaming entertainment, and more. The Internet has become an integral part of your daily life.Read more about Internet here:
https://brainly.com/question/2780939
#SPJ3
When people become more dependent on digital technology in their lives, the potential for data misuse will grow.
Explain the above sentence in your opinion.
Answer and I will give you brainiliest
Answer:
abbjiaj
zzz
Explanation:
uuwuwahsbsbsssiaaivab njw
_________is a type of bullying that occurs when a person continuously pursues another and gives
unwanted attention
Answer:
stalking ?
Explanation:
Answer:
stalking
Explanation:
There are a series of factors and people who save Glenn Curtiss from
bankruptcy what are they
Answer: "Due to patent issue, he paid his worker from his pocket. He paid 10,000 dollars bond which led him towards bankruptcy, Curtiss, have no option, so he accepted the challenge to fly from Albany to Manhattan and won a prized of 10,000 dollars. "
short answer:
The Wright Brothers and the Challenge to fly.
Explanation: hope it helps!
You plan to write an app to find the best hiking trails for families. Which statement is true about this step?
You have drawn pictures of what your screens will look like and identified the input-process-output that occurs on each screen.
You have defined a use case.
In this step, you defined your target audience and main goal.
Your app is functioning and ready to test.
The statements that are true about this step are:
In this step, you defined your target audience and main goal.You have drawn pictures of what your screens will look like and identified the input-process-output that occurs on each screen. Your app is functioning and ready to test.Is it hard to create an app?
Most times, it often takes at least 4- 6 weeks to be a good Android developer. Note that a Basic developer skills are said to be not enough to build a commercial app and as thus, one need good training.
Conclusive, By knowing your target audience and following the steps above, one can make a good hiking app.
Learn more about hiking from
https://brainly.com/question/16430743
Answer:
C: in this step, you defined your target audience and main goal
Explanation:
got it right on edge
In the file Calculator.java, write a class called Calculator that emulates basic functions of a calculator: add, subtract, multiply, divide, and clear. The class has one private member field called value for the calculator's current value. Implement the following Constructor and instance methods as listed below: public Calculator() - Constructor method to set the member field to 0.0 public void add(double val) - add the parameter to the member field public void subtract(double val) - subtract the parameter from the member field public void multiply(double val) - multiply the member field by the parameter public void divide(double val) - divide the member field by the parameter public void clear( ) - set the member field to 0.0 public double getValue( ) - return the member field
Answer:
Explanation:
The following calculator class written in Java has all the methods and variables requested in the question, each completing their own specific function to the member variable.
class Calculator {
private double member;
public Calculator() {
this.member = 0.0;
}
public void add(double val) {
this.member += val;
}
public void subtract(double val) {
this.member -= val;
}
public void multiply(double val) {
this.member *= val;
}
public void divide(double val) {
this.member /= val;
}
public void clear() {
this.member = 0.0;
}
public double getValue() {
return this.member;
}
}
What function in the secrets module can generate random integers between one and 30, including the possibility of both one and 30.
secrets.random(30)
secrets.randbelow(31)
secrets.randbelow(30)
secrets.random(30)
Answer:
secrets.randbelow(31)
Explanation:
This is Python Language, and secrets is an external module. So, to use it you need to install it using pip, just type pip install secrets in any terminal. And secrets module will be installed. If you will use the 1st or last code it will give give you error, because secrets module does not have any attribute named random. If you will use the 3rd code it will print random number from 0 to 29 only. If you also want to print 30, you need to you need to write the code given below:
import secrets
secrets.randbelow(31)
Why is it important to think about the programming language to use?
Answer:
"The choice of programming language determines the type of game you can make."
Explanation:
Programming language enables us to write efficient programs and develop online things based on the certain type of code.
Hiding text in a picture is known as?
Answer:streganography
Explanation: it allows you to hide text in an image without anyone knowing
An Acceptable Use Policy (AUP) are designed for the purpose of _____.
compressing files
maximizing processing power
safety
anonymity
Answer:
maximizing processing power
An Acceptable Use Policy is made up for safety. Check more about the terms below.
What does an Acceptable Use Policy made up of ?An acceptable use policy is one that is made up of a general statement that links to the safe and good use of email and the internet.
Note that based on the above, An Acceptable Use Policy is made up for safety of all in the use of the internet.
Learn more about Policy from
https://brainly.com/question/3653791
#SPJ2
What is computer software?
Answer:
Software is a collection of instructions and data that tell a computer how to work. This is in contrast to hardware, from which the system is built and actually performs the work.Explanation:
HOPE IT HELPAnswer:
software is the collection of programs which makes computer work.
Which of the following is an example of an output device on a smartphone?
the speaker
the microphone
the battery
the memory card
Answer:
The speaker
Explanation:
Speakers are output devices because the audio is taken from the app or website and playing it towards the speakers.
Write a pseudocode algorithm to ask the user to input the name of a student, the marks he/she received in a test and the worth of the test. Calculate the percentage mark the student received. Print the student's name and percentage the student received.
Pseudocode algorithms are used as prototypes of an actual program.
The required pseudocode algorithm is as follows:
Startinput name, score, test_worthpercent_score = score/test_worth * 100print name, percent_scoreStopThe first line begins the pseudocode algorithm
Start
The second line gets input for the student's name, score and the worth of the test
input name, score, test_worth
The third line calculates the percentage score
percent_score = score/test_worth * 100
The next line prints the student's name and the percentage score
print name, percent_score
The last line ends the pseudocode
Stop
Read more about pseudocode algorithms at:
https://brainly.com/question/21172316