Answer:
Information systems assist in disseminating information by allowing managers and other organization leaders to store data in folders and documents that can be seamlessly shared with the appropriate employees.
Explanation:
Why do software developers prefer to use high-level language to author programs?
It can be used on computers without microprocessors.
It prevents anyone from making changes to the software later.
It uses a more English-like syntax.
It’s less complicated because it only uses zeros and ones.
Answer:
The answer to this question is given below in the explanation section
Explanation:
The correct answer to this question is: it used a more English-like syntax.
The software developer use high-level language to develop or author the program because it is more likely to English syntax and it would be easy for a software developer to author a program easily instead of using low level language and remembering ones and zeros.
Other options are not correct because:
It can be used on computers without microprocessors: Each computer has a microprocessor either you develop a program using high-level or low-level languages. Changes and modifications are easy in high-level language than in low-level languages. so, the option that prevents anyone from making changes to the software later is wrong. However, high-level languages are less complicated in learning and in authoring the programs but it does not use zeros and ones, it uses English-like syntax. So, the last option is also wrong.
Answer:
b
Explanation:
write the issue related to the cyber ethnic.
people may hack our person information.
Answer:
hiii ,and thank uuuu!!!!!!!
How has technology effected the way we communicate?
Indeed it has.
Advancements in technology and changes in communication generally go hand in hand. Landlines displaced the telegraph and cell phones replaced landlines. The arrival of the internet opened new doors of personal communication. E-mails replaced postal mails and social media took the place of text messages.
Communication technology, such as mobile phones, email, text messaging, instant messaging and social networking have had a profound effect on nearly everyone's business and personal lives. While technology makes communications faster and easier, at times it can also be intrusive and misinterpreted.
Increased isolation, reduced social interaction and social skills, and increased human-to-machine interactions are all a result of an overuse of technology, which has created a wall between many people globally.
Technology has the ability to enhance daily living from appliances to mobile devices and computers, technology is everywhere. ... In the rise of digital communication, technology can actually help communication skills because it allows people to learn written communication to varying audiences.
-Astolfo
what do you think about when you enter school
Answer:
i think my day is about to start and i'm going to get the chance to finally talk to my best friends on D!$C0rD, and then i think about how my parents are rUDe for not letting me talk to my friends. :/
Not again
Or
I’m going to end my life today
I don’t like school
HURRY PLEASE
The software that allows programmers to write and run code is called an IDE True O False
Explanation:
true
................
Answer:
False
Explanation:
Hope this helps.
50 PTS
in Java
Write a program with a method called passwordCheck to return if the string is a valid password. The method should have the signature shown in the starter code.
The password must be at least 8 characters long and may only consist of letters and digits. To pass the autograder, you will need to print the boolean return value from the passwordCheck method.
Hint: Consider creating a String that contains all the letters in the alphabet and a String that contains all digits. If the password has a character that isn’t in one of those Strings, then it’s an illegitimate password!
import java.util.Scanner;
public class JavaApplication46 {
public static boolean passwordCheck(String pass){
String alphanum = "abcdefghijklmnopqrstuvwxyz1234567890";
boolean legit = true;
if (pass.length()>= 8){
for(int i = 0; i < pass.length(); i++){
if (alphanum.indexOf(pass.charAt(i)) != -1 && legit != false){
legit = true;
}
else{
legit = false;
}
}
}
else{
legit = false;
}
return legit;
}
public static void main(String[] args) {
Scanner scan = new Scanner(System.in);
System.out.print("Enter a password: ");
String password = scan.next();
System.out.println(passwordCheck(password));
}
}
I hope this helps!
Identify an advantage of writing HTML code manually.
You do not have to learn HTML.
You can figure out how the markup affects the function of the site.
You can see rendered HTML as you go.
Answer:
1. You retain 100% control over your site and where it is hosted
2. Free WYSIWYG sites aren’t really free
3. You make yourself seem irrelevant to clients
4. You understand your own code
5. Your own code is nearly always more efficient
6. Your own code is more secure
7. It’s easier to iterate your own code
8. Your own code is original
9. Writing your own code helps you grow as a developer
Explanation:
You can choose the points you want. let me know if you need any further information.☺️
Please rate if you happy
Brailliest if you want
Answer:
B. You can figure out how the markup affects the function of the site.
Explanation:
its the correct answer :)
Step into my world
Bittersweet love story about a girl
Shook me to the core
Voice like an angel, I've never heard before
Here in front of me
Shining so much brighter than I have ever seen
Life can be so mean
But when he goes, I know he doesn't leave
[Pre-Chorus 1: Charlie Gillespie & Madison Reyes]
The truth is finally breaking through
Two worlds collide when I'm with you
Our voices rise and soar so high
We come to life when we're
[Chorus: Charlie Gillespie & Madison Reyes]
In perfect harmony
Woah, woah
Perfect harmony
Woah, woah
Perfect harmony
[Verse 2: Charlie Gillespie, Madison Reyes, Charlie Gillespie & Madison Reyes]
You set me free
You and me together is more than chemistry
Love me as I am
I'll hold your music here inside my hands
[Pre-Chorus 2: Charlie Gillespie & Madison Reyes]
We say we're friends, we play pretend
You're more to me, we're everything
Our voices rise and soar so high
We come to life when we're
[Chorus: Charlie Gillespie & Madison Reyes]
In perfect harmony
Woah, woah
Perfect harmony
Woah, woah
Perfect harmony
[Bridge: Charlie Gillespie, Madison Reyes, Charlie Gillespie & Madison Reyes]
I feel your rhythm in my heart, yeah-yeah
You are my brightest, burning star, woah-woah
I never knew a love so real (So real)
We're heaven on earth, melody and words
When we are together we're
[Chorus: Charlie Gillespie & Madison Reyes]
In perfect harmony
Woah, woah
Perfect harmony
Woah, woah
[Outro: Charlie Gillespie, Madison Reyes, Charlie Gillespie & Madison Reyes]
We say we're friends
We play pretend
You're more to me
We create a perfect harmony
Answer:
THIS SONG IS FIRE AND WHEN IT HAPPENED IN THE SHOW, I FAINTED*
Explanation:
Julie and the Phantoms is my favorite thing in the world.
Select all the lines that have a slope of 5/2
Answer:
Add a picture, then ask the question again.
Anisha was learning ‘for’ and ‘while’ loop. Help her understand why for and while loops are called entry controlled loops.
Entry controlled loop - The loop which has a condition check at the entrance of the loop, the loop executes only and only if the condition is satisfied is called as entry control loop.
So, for and while loops are its examples.
Linux does not provide a GUI for its users.
-True
-False
Answer:
False
I know for a fact this is false.
Brainliest?
Answer:
it is false why would they not
Code Hs karal 3.4.2 lots of hurdles?? I cannot figure this one out at all
Answer:
codeHS 3.4.2: Lots of Hurdles answer
Explanation:
Someone plz im begging for ur help plzz??
Answer:
woah what subject is this-
Explanation:
Why are many otherwise safety-conscious people victims of Internet crime?
A. They are naïve and gullible.
B. Hackers are smarter than criminals in the non-digital world.
C. Effective security measures are very complex.
D. They have not been educated in safe digital best practices.
Answer:
D
Explanation:
:)
The people who get or become the victims of internet crime are those who don't have been educated about safety in digital space.
Internet crime is cyber fraud. The crime involves the computer and the network, as it may be targeted for the victim. One needs to have complete knowledge of cyber security and safety procedures.Hence the option D is correct.
Learn more about the people victims of Internet crime
brainly.com/question/5633960.
1) I hurt my leg yesterday, and I had to go to the doctor. 2) I asked my mother to write an excuse for me to get back in school. 3) She wrote that I had twisted my ankle doing exxercise. 4) She also wrote that I had been prescribed some medicine that could make me sleepy. 5) Finally, she wrote that she wanted to exttend her apologies for my absence. 7. Which of the first four sentences contains an error in spelling? Sentence 1 Sentence 2 Sentence 3 Sentence 4
Answer: Sentence 3
Explanation:
Because exxercise is spelled wrong its spelled exercise.
Answer:
the correct answer would be 3 AND 5
3)She wrote that I had twisted my ankle doing exxercise.
it is spelled wrong, it needs to be exercise
5)Finally, she wrote that she wanted to exttend her apologies for my absence.
it is spelled word, it needs to be extend
hope this helped
Beth earned a bachelor’s degree and has worked as a systems analyst for three years. Which of the following has Beth acquired? experience data information knowledge
A.experience
B.Data
C.information
D.Knowledge
Select the correct answer.
What does a script supervisor do?
O A. supervises the final edits of the script
OB.
helps the video editor to segregate useful clips from the junk
Ос.
revises the initial script before the process of logging
D. keeps a close watch on the monitor
E.
carries out assembly editing for a production house
Answer:
B
Explanation:
In a science study group, Leonardo explains how atoms make up molecules. Talia repeats what Leonardo says in her own words. How is Talia practicing active listening? She is reflecting on what has been said. She is politely disagreeing with Leonardo. She is asking Leonardo a lot of questions. She is focused on only important information.
Answer:
A she is reflecting on what leonardo said but in her own words
Explanation:
Answer:
A: She is reflecting on what has been said.
Explanation:
Edge 2020
Modern commercial air travel is more akin to urban mass transit than it is to recreational travel true or false?
Answer:
true
Explanation:
because who knows how it works that way
Answer:
false
Explanation:
i got it right
Umm, my computer is being rlly wierd and not letting me give brainliest to someone, anybody know what to do???
Answer:
just restart it and when the computer is done restarting then repeat the process once more. This is what i did and it made a huge difference.
Explanation:
This resets the main hard drive and the reboots the system entirely. It helps clear out bugs and fixes any and all small issues.
Describe how each command is used by matching the command to its purpose.
removes data fror
places it on the cli
Paste
cancels a previou
Undo
restores a previou
Copy
duplicates data a
clipboard
Cut
Redo
places data in its
Answer:
The correct answer to this question is given below in the explanation section.
Explanation:
The correct command matches its use are given below:
Paste Places data in its
Undo Cancel a previous
Copy Duplicates data on the clipboard
Cut Removes data for places it on the clipboard
Redo restores a previous
Paste term is used when you are placing copied data. Undo is used to cancel a previous action performed while Redo is used to restores a previously performed action. The copy is used to duplicate data on the clipboard while Cut is used to removes data for places/ to paste somewhere else.
Which component in a CPU is responsible for transferring
data from one functional component to another?
Why might be one reason a stock becomes more valuable over time?
A. The industry is growing
B. The company is well managed
C. There’s a lot of demand on the product
D. All of the above
The ______ is designed to store audio data on computers and/or digital music players.
A. waveform
B. audio file format
C. sample rate
D. bandwidth
Answer:
audio file formats of computer
WRITE IN YOUR OWN WORDS:
What is a possible sign that your computer has been hijacked by Botware?
Answer:
One major sign of a computer being hijacked is the use of system resource by unknown programs. For example, full memory, high cpu usage, slow start up, crashes and errors, and low avalible storage space.
Explanation:
PLS HURRY!!
Look at the image below
Answer:
1. A function can use variables as parameters.
2. A function can have more than one parameter.
3. The definition of a function must come before where the function is used.
Explanation:
The definition of a function can come before or after it is used - I am pretty sure it cannot be placed after the function is being used. It should always come before it is used, so this statement is false.
A function can use variables as parameters - this is true, variables are just labels to hold data.
A function can have more than one parameter - this is true.
A function must have a return value - functions do not always have to return values. It could simply print, so this statement is false.
The definition of a function must come before where the function is used - As said earlier, the definition of functions must come before it is used/called. This statement is true.
Hope this helps :)
What does it mean to be proactive about internet safety?
Spending as little time online as possible to reduce the risk of problems.
Predicting problems before they happen so you can avoid them.
Finding the best way to solve a current problem so you can use it later.
Facing up to the consequences of your mistakes so you can learn from them.
Answer:
Predicting problems before they happen so you can avoid them.
Explanation:
You should avoid causing trouble, or partaking in it. Being safe on the internet helps reduce bullying, threats, depressing behavior, etc.
In most places of work, how long should it take someone to respond to an e-mail?
no obligation to respond
one hour
twenty-four hours
one week
Answer:
24 Hours
Explanation:
Now Ideally, someone when they are working should respond immediately, but its 24 hours because, if someone is in a different Timezone, Or you sent an email late and tehy read it at 12pm or something it allows them good wiggle room while giving you a dcently fast reply.
Answer: 24 hours
Explanation: It's correct
a.
Define a computer with its proper meaning.
Answer:
Computer
Explanation:
a programmable electronic device designed to accept data, perform prescribed mathematical and logical operations at high speed, and display the results of these operations.
Answer:
computer
Explanation:
An electronic machine that processes, stores data, and does calculations.
Help me pls!!! last question
Tori needs to turn her Turtle to the left 90 pixels. Which line of code should Tori use?
tina(90)
tina.back(90)
tina.left(90)
tina.right(90)
Answer:
tina.left(90)
Explanation:
In code if you want your character to turn left you put "left" in your code and if you want your character to go right type "right" and so on and so on so your answer is tina.left(90)
Answer: Option C is the correct line of code Tori should use.
tina.left(90)
Explanation:
I took the test and got it correct, you can trust me.
, Hope this helps :)
Have a great day!!