what is the process of making a prototype of your mobile app?

Answers

Answer 1

The process of making a prototype of a mobile app is an essential step in the app development process. A prototype is the first version of the app that can be used to test user interface (UI) designs, and user experience (UX) before the actual app is developed.

A mobile app prototype is a simple layout that allows a user to get a feel for the app's functionality and design. Creating a mobile app prototype includes the following steps:Step 1: Identify the main objective of your mobile appBefore creating a mobile app prototype, it is important to identify the main objective of your app. This will help you create a layout that meets your app's objectives. You can brainstorm with your team and come up with a few ideas that can guide you in creating your prototype.

Step 2: Identify the core functionality of your appAfter identifying the main objective of your app, you need to identify the core functionality of your app. This will help you prioritize features that are essential to your app's success.

Step 3: Sketch your app designAfter identifying the main objective of your app and the core functionality of your app, you can now begin to sketch the design of your app. You can use tools like Adobe XD, Sketch, or Figma to create your sketches. Sketching will help you map out the placement of your app elements and create a visual representation of your app.Step 4: Create wireframesAfter creating sketches of your app design, you can then create wireframes. Wireframes are a more detailed version of your sketches.

To know more about prototype visit:

https://brainly.com/question/29784785

#SPJ11


Related Questions

Assume that the int variables i and j have been declared, and that n has been declared and initialized. Using for loops (you may need more than one), write code that will cause a triangle of asterisks of size n to be output to the screen. For example, if n = 3, the triangle is as follows:

Answers

Assuming the int variables i and j have been declared and n has been declared and initialized, you can use the following code to output a triangle of asterisks of size n to the screen:

for (i = 0; i < n; i++) {
 for (j = 0; j <= i; j++) {
   System.out.print("*");
 }
 System.out.println();
}

Lets discuss this code more in detail.

This code uses two loops to output the triangle: the outer loop is used to control the number of rows while the inner loop is used to print the correct number of asterisks on each row. This will produce a triangle of asterisks of size n on the screen.

Learn more about int variables.

brainly.com/question/28874745

#SPJ11

Which button can be pressed to undo the changes made to the assets in a sensitivity scenario if you have not saved the scenario?

Answers

"Ctrl+Z" on Windows or "Command+Z" on Mac  can be pressed to undo the changes made to the assets in a sensitivity scenario if you have not saved the scenario.

What are shortcut keys?

Shortcut keys, also known as keyboard shortcuts, are combinations of keys that can be pressed simultaneously or in sequence to perform a specific action or command in a software application or operating system. Using keyboard shortcuts can be a faster and more efficient way to perform common tasks, as it eliminates the need to navigate through menus and toolbars with the mouse.

Some examples of common keyboard shortcuts include "Ctrl+C" (or "Command+C" on Mac) to copy selected text or items, "Ctrl+V" (or "Command+V" on Mac) to paste copied text or items

Keyboard shortcuts are typically designed to be easy to remember and follow a consistent pattern across different software applications and operating systems. However, the specific keys used for a shortcut may vary depending on the application or operating system.

Many software applications and operating systems provide a list of keyboard shortcuts that can be accessed through the help menu or a dedicated shortcut reference. Learning and using keyboard shortcuts can help increase productivity and reduce repetitive strain injuries caused by prolonged mouse usage.

In most sensitivity analysis software or spreadsheets, the button or command to undo changes made to assets in a sensitivity scenario is usually the "Undo" button or the keyboard shortcut "Ctrl+Z" on Windows or "Command+Z" on Mac.

The "Undo" command allows you to reverse the most recent change made to the scenario, and typically you can use it repeatedly to step backward through the changes until you reach the desired state.

However, it's important to note that the "Undo" command only works if the changes have not been saved. Once you have saved the scenario, the changes become permanent, and you may not be able to undo them without manually adjusting the values again.

Therefore, it's recommended to save your sensitivity scenario periodically as you work on it, to avoid losing your progress and to be able to go back to previous versions if needed.

To know more about command visit:

https://brainly.com/question/30236737

#SPJ1

Whats the best way to make a video game?

Answers

Answer:

Step 1: Do Some Research & Conceptualize Your Game. ...

Step 2: Work On A Design Document. ...

Step 3: Decide Whether You Need Software. ...

Step 4: Start Programming. ...

Step 5: Test Your Game & Start Marketing

If you wanted a smartphone with the fewest restrictions on application development which smartphone operating system should you choose

Answers

Answer:

Apple iOS

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

Basically, softwares are categorized into two (2) main categories and these are;

I. Proprietary software: it's also known as a closed-source software and it can be defined as any software application or program that has its source code copyrighted and as such cannot be used, modified or distributed without authorization from the software developer.

II. Open-source software: it's a type of software in which end users are granted the permission to use, study, modify, copy and share the software with its source code anyhow.

An Apple iOS is an example of an operating system that has the open-source software features and as such its users are faced with minimal restrictions on application development.

This ultimately implies that, if you wanted a smartphone with the fewest restrictions on application development the smartphone operating system you should choose is Apple iOS.

In today's e - commerce world, 'Disintermediation' may only affect intermediaries who are not performing value added services to customers. Do you agree with this statement? Explain why?

Answers

Answer:

No

Explanation:

Although 'Disintermediation' does affect these intermediaries I believe it also affects those that 'are' providing valuable services. This is because many other factors come into play when deciding to reduce intermediaries. Sometimes when a company has various intermediaries, a single one can provide the same value as two, therefore, for the company, it is more valuable to reduce the number of intermediaries that they have and provide more resources to fewer intermediaries so that they perform better for less pay. This is one of a few reasons why it can affect any intermediary, not just the ones that do not provide value.

What is the underlying complexity decimal numbers were used to represent. How were decimal numbers helpful in designing a system to represent text in bits?

Answers

Answer:

The underlying complexity decimal numbers were used to represent are bits, the decimal numbers were helpful in designing a system to represent text in bits because it is easier to read and it separates different texts.

Explanation:

1. What are the common elements in competitive situations when modeled as games? In what dimensions do competitive situations potentially differ? L.O. - Sizing Up Competitive Situations


2. Define and distinguish between zero-sum games and non-zero-sum games. L.O. - Sizing Up Competitive Situations

Answers

In competitive situations modeled as games, there are common elements that can be observed. These elements include:Players: In a competitive situation, there are individuals or entities who are actively involved in the game.

These players can make decisions and take actions that affect the outcome of the game.Objectives: Each player in a competitive situation has a goal or objective they are trying to achieve. This could be winning the game, earning a certain amount of money, or gaining a competitive advantage over other players.Strategies: Players in a competitive situation develop strategies to increase their chances of achieving their objectives.

These strategies involve making decisions and taking actions that are aimed at outperforming other players. Rules: Competitive situations have rules that govern how the game is played. These rules determine what actions are allowed or prohibited,  In zero-sum games, the interests of players are in direct conflict, and the focus is on outperforming other players. In non-zero-sum games, there is the possibility of cooperation and mutual benefit, which can lead to more favorable outcomes for all parties involved.Overall, understanding the common elements and dimensions of competitive situations, as well as the distinction between zero-sum and non-zero-sum games, can provide valuable insights into the dynamics and potential outcomes of different competitive scenarios.

To know more about situations modeled visit:

https://brainly.com/question/2112913

#SPJ11

Given the following C struct:
struct person
{
char *name;
int age;
int height; //in inches
char eye_color;
};
Dynamically allocate the memory for a struct person, as defined above. Assign the struct person your attributes (or make some up). Use dynamic memory allocation for the struct person's name

Answers

To dynamically allocate the memory for a struct person in C, we can use the malloc() function. This function is used to allocate memory dynamically during program execution. We can use it to allocate memory for the person struct and the name pointer.

To allocate memory for the person struct, we first need to calculate the size of the struct. We can do this using the sizeof() operator, like this:

struct person *p = malloc(sizeof(struct person));

This will allocate enough memory for a person struct. Next, we can assign values to the struct's members. For example, we could set the name, age, height, and eye color like this:

p->name = malloc(strlen("Ginny") + 1);
strcpy(p->name, "Ginny");
p->age = 25;
p->height = 65;
p->eye_color = 'B';

Here, we first allocate memory for the name string using strlen() to get the length of the string and adding 1 to include the null terminator. We then copy the string "Ginny" into the allocated memory using strcpy(). Finally, we assign values to the other members of the struct.

Remember, when dynamically allocating memory, we must always free the memory when we're done with it. We can do this using the free() function, like this:

free(p->name);
free(p);

This will free the memory allocated for the name string and the person struct itself.

To know more about memory visit:

https://brainly.com/question/2488338

#SPJ11

The Quick Access Toolbar is typically
located in the top-right corner of the
window, above the ribbon.
True
False

Answers

Answer:

False

Explanation:

It is on the left

it is false hey a so it’s a

Spectrum Technologies uses SHA 256 to share confidential information. The enterprise reported a breach of confidential data by a threat actor. You are asked to verify the cause of the attack that occurred despite implementing secure cryptography in communication. Which type of attack should you consider first, and why?

Answers

The type of attack in the case above that a person need to consider first, is Misconfiguration attack.

Why Misconfiguration attack?

Due to the fact that the company need to have configured a higher security hash algorithm instead of using the less-secure SHA 256 and as such the attack occurred.

Therefore, The type of attack in the case above that a person need to consider first, is Misconfiguration attack.

Learn more about Misconfiguration attack from

https://brainly.com/question/15702398

#SPJ1

1-24. Consider the data needs of the student-run newspaper in .. your university or high school. What are the data entities of this enterprise? List and define each entity. Then, develop an enterprise data model (such as Figure 1-3a) showing these entities and important relationships between them. Key Database Concepts Figure 1-3: Comparison of enterprise and project-level data models CUSTOMER (a) Segment of an enterprise data model Places Is Placed By ORDER Contains Is Contained In PRODUCT

Answers

The relationships between these entities are as follows: 1. A student staff member writes a story.2. A story has multiple sources.3. An editor reviews a story written by a student staff member.4. The newspaper contains multiple stories.5. Advertisers place ads in the newspaper.6. The newspaper includes photographs and videos taken by the student staff members.

The student-run newspaper is an enterprise that requires data entities to function efficiently. Here are the data entities that are essential for the efficient functioning of the student-run newspaper in a high school or university:

1. Student Staff: These are students who work for the newspaper. They are responsible for collecting data, writing stories, and publishing the newspaper.

2. Stories: These are the articles that the newspaper writes. They include news articles, features, opinions, sports, and other content that is published in the newspaper.

3. Sources: These are the individuals, organizations, and institutions that provide information for the newspaper's articles.

4. Editors: These are the students who oversee the work of the student staff. They are responsible for ensuring that the newspaper adheres to the highest journalistic standards.

5. Advertisers: These are the businesses that advertise in the newspaper. They are an essential source of revenue for the newspaper.6. Photographs and Videos: These are the images and videos that accompany the newspaper's articles. To develop an enterprise data model, we need to understand how these data entities relate to each other.

Know more about  data entities  here:

https://brainly.com/question/31534215

#SPJ11

What is the value of the variable named result after this code is executed?

numA = 3
numB = 2
result = numA ** numB


An error occurred.
An error occurred.



ANSWER IS 9

Answers

Answer: result = 9

Explanation:

numA has an integer value of 3

numB has an integer value of 2

result is the value of numA ** numB (or 3 ** 2)

In python, "**" operator means "to the power of" and it is used to create exponents. So writing result mathematically would be the same as:

\(3^{2} \)

The value of 3 to the power of 2 is 9 because 3 x 3 is equal to 9.

In video game development, the person who is responsible for designing and documenting the visual screen layout and function of game menus and on-screen displays is the

Answers

Answer:

UI/UX Designer

Explanation:

The individual that is responsible for making this happen is known as the UI/UX Designer. This individual's job revolves around gathering all the necessary data of what the end consumer wants/needs in order to create the most efficient and user-friendly graphical user interface for them. This includes all of the buttons, text, widgets, etc. that the interface needs for the user to interact within the game menus and on-screen display.

You are a system analyst at Circle Tech Inc. Describe in high
detail, ten system analysis & design activities and the related
tools & techniques you would use for an information system
develop

Answers

As a system analyst at Circle Tech Inc., here are ten system analysis and design activities that I would undertake for developing an information system, along with the related tools and techniques:

Understanding User Requirements: The first step is to understand user requirements and expectations from the new system. For this, I would use techniques like interviews, surveys, focus groups, and observation. To document these requirements, I would use tools like use cases, user stories, and data flow diagrams.

Developing a System Concept: Once we have a clear understanding of user requirements, the next step is to develop a high-level concept for the system. To do this, I would use tools like mind maps, brainstorming, and SWOT analysis.

Identifying System Objectives: The next step is to identify the objectives of the system, which could be related to improving productivity, reducing costs, enhancing customer satisfaction, or any other business-related goal. To do this, I would use tools like SMART criteria and KPIs (Key Performance Indicators).

Conducting Feasibility Study: Before starting the actual development process, it's essential to ensure that the proposed system is feasible in terms of its technical, operational, and financial aspects. To conduct a feasibility study, I would use tools like cost-benefit analysis, risk assessment, and SWOT analysis.

Creating System Design: After conducting the feasibility study, the next step is to create the system design, including software architecture, database design, user interface design, and network infrastructure. To do this, I would use tools like UML (Unified Modeling Language), ERD (Entity-Relationship Diagram), and wireframing.

Developing Prototypes: To test the system designs, we need to create prototypes of the proposed system. This allows us to get feedback from users and stakeholders before developing the final system. To create prototypes, I would use tools like mockups, storyboards, and rapid application development (RAD) techniques.

Testing the System: Once we have developed the prototypes, the next step is to test the system to ensure it meets all user requirements, objectives, and quality standards. To do this, I would use tools like unit testing, integration testing, system testing, and acceptance testing.

Implementing the System: After testing, the system is ready to be implemented in the production environment. This involves installing the software, configuring the infrastructure, and training the users. To do this, I would use tools like deployment checklists, release management tools, and training materials.

Monitoring and Maintaining the System: Once the system is live, it's essential to monitor and maintain it to ensure that it continues to meet user requirements and quality standards. To do this, I would use tools like performance monitoring, log analysis, and change management processes.

Continuous Improvement: Finally, we need to continuously improve the system by identifying areas for enhancement based on user feedback, business needs, and technology advancements. To do this, I would use tools like continuous integration and continuous delivery (CI/CD) pipelines, agile development methodologies, and DevOps practices.

In summary, these are ten crucial system analysis and design activities that I would undertake for developing an information system, along with the related tools and techniques.

Learn more about system analyst here:

https://brainly.com/question/32318451

#SPJ11

What is the current state of AI in Manufacturing?

Answers

AI in manufacturing is still in its early stages and is currently being used primarily for predictive maintenance and process optimization. By leveraging machine learning algorithms and analytics tools, AI can detect potential problems before they happen and help to optimize processes by analyzing data from sensors and machines. In addition, AI can be used for more complex tasks such as automating quality assurance, testing products in real-time, and optimizing supply chain management. There are also several other applications of AI in manufacturing that are being explored, such as robot-assisted automation, autonomous vehicles, and 3D printing.

PLEASE HURRY!!!! Look at the image below!

PLEASE HURRY!!!! Look at the image below!

Answers

Answer:

print()

The print() function prints the programs  message to the screen, or other standard output devices, I hope that this helps (◠‿◠)

Answer: i think it is input

Explanation:

because the word input means to put in something or  operate

When using an observational method of data collection, what type of information is potentially gathered

Answers

Observational method of data collection involves systematically observing and recording behavior or events without actively intervening or manipulating the environment. This method can potentially gather a wide range of information, including:

Descriptions of behavior: Observers can record detailed descriptions of the behavior they observe, including what is said, actions taken, and any other relevant details.

Frequency and duration of behavior: Observers can count how often a behavior occurs and how long it lasts, which can help to quantify patterns of behavior.

Nonverbal communication: Observers can record nonverbal communication such as facial expressions, body language, and tone of voice.

Contextual factors: Observers can take note of contextual factors that may influence behavior, such as the physical environment or social setting.

Relationships between variables: Observers can look for relationships between different variables, such as how often a behavior occurs in response to a particular stimulus or in the presence of certain environmental factors.

Overall, observational methods can provide rich, detailed data about behavior and events, making them a valuable tool for research in many fields.

Learn more about data  here:

https://brainly.com/question/10980404

#SPJ11

what benefits are exclusive to the top playstation plus tier

Answers

PlayStation Plus Collection is a premium tier with PS4 games, enhanced PS5 performance, extended PS Now trial, and all standard tier benefits.

The top PlayStation Plus tier, called PlayStation Plus Collection, offers exclusive benefits that are not available in the standard PlayStation Plus tier. These benefits include access to a collection of popular PlayStation 4 games, such as Bloodborne, God of War, and Uncharted 4: A Thief's End, that can be downloaded and played on PlayStation 5. Additionally, PlayStation Plus Collection subscribers receive an extended trial of the PlayStation Now streaming service, which provides access to a large library of games that can be streamed on-demand.

PlayStation Plus Collection also offers enhanced performance and faster load times for some of the included games when played on PlayStation 5. This is due to the console's advanced hardware and capabilities. In addition to these benefits, PlayStation Plus Collection subscribers also have access to all of the benefits offered in the standard PlayStation Plus tier, such as online multiplayer, monthly free games, and exclusive discounts on games and add-ons in the PlayStation Store. Overall, the PlayStation Plus Collection is a premium service for PlayStation 5 owners that provides an enhanced gaming experience with a curated selection of popular games from the previous generation.

Learn more about hardware here:

https://brainly.com/question/30541441

#SPJ4

Which is one use for a hyperlink? A. to create a heading style B. to animate important text C. to create a link to a website. D. to hyphenate words.

Answers

Answer:

D

Explanation:

Hyperlink in html, cascading style Sheets, javascript etc. Is use to connect one page to another.

Also, it can be used to link one site to another website.

So, according to the question below:

Which is one use for a hyperlink? A. to create a heading style B. to animate important text C. to create a link to a website. D. to hyphenate words

The correct answer is to create a link to a website. Which is D.

Through office 365, microsoft offers a variety of applications such as mail, calendar, and storage services via its ________ cloud offering.

Answers

Microsoft makes a number of programs available through office 365, including calendar, mail, and storage services.

The Microsoft 365 product line, which consists of cloud-based services and productivity tools, is owned by Microsoft. It covers software programs that were once marketed under the Microsoft Office name, as well as web tools like cloud, Outlook.com, OneDrive, and Microsoft Teams.

These include enterprise products and services including Exchange Server, SharePoint, and Yammer, as well as Word, Excel, PowerPoint, and Outlook for Microsoft Windows, macOS, mobile devices, and the web.

This comprises hosted email and intranet services, desktop and mobile application licenses, and subscription plans that cover these items (formerly known as Microsoft 365).

Users can access the cloud, a category of on-demand Internet-based service, without worrying about installation or maintenance.

To know more about Microsoft click here:

https://brainly.com/question/26695071

#SPJ4

write any three primary activities of a program??​

Answers

Answer:

Input, Processing, and Output

Explanation:

Hope it helps you..

Your welcome in advance..

(◍•ᴗ•◍)

The main three  primary activities of a program are input, processing and output.

Input: The program receives input from the user or from external sources to obtain the necessary data or information it needs to perform its tasks. This input can be in various forms, such as user interactions, file input, network communication, or sensor readings.

Processing: Once the program has obtained the required input, it performs various processing activities on the data.

This may include calculations, transformations, manipulations, comparisons, sorting, filtering, or any other operations necessary to achieve the desired functionality or output of the program.

Output: After processing the input data, the program generates output to provide the results, feedback, or information to the user or external systems.

The output can take different forms, such as displaying information on the screen, writing to files, sending data over a network, or triggering actions in connected devices or other software components.

To learn more on Program click:

https://brainly.com/question/14368396

#SPJ6

Mark true or false IT questions

1:you can change the default font style in word ( )

2:A pie chart represent only one data series ( )

3:MS-DOS is a graphical user interface operating system ( )

4:a presentation software is a application software ( )

5: only addition can be done in the ALU ( )

fill in the blanks...............

1:A ................... mouse is looking like a pencil

2:A/An ......................... is an interface between the user and the computer​

underline the correct answer

1: the.......... function multiple the numbers in Excel

add

sum

products

Min

2:to enter the data in multiple lines

wrap text

merge and center

orientation

all of these

3:a list is used when the unordered of items is marked

bulleted

numbered

both a and b

non of these

4:the screen that you see after you signed in the computer

wallpaper

desktop

screen saver

non of these

5:the ............. manages the working and control of a network device

Device driver

kernel

file system

all of these

Answers

Answer:

1. true

2. true

3. false

4. false

5. false

Domain local groups are primarily used to hold global groups and provide access to domain resources. group of answer choices true false

Answers

True , Domain local groups are primarily used to hold global groups and provide access to domain resources.

What is Domain local groups ?

Domain local groups are Windows Server groups whose scope is limited to the specific domain in which they are defined. Domain local groups are used to deliver users with access to network help and to assign permissions to control access to these resources.

What can domain local groups contain?

Members from any domain may be counted to a domain local group. The domain's local scope can contain user accounts, universal groups, and global groups from any domain. In addition, the scope can both hold and be a member of domain local groups from the same domain.

To learn more about Domain local groups, refer

https://brainly.com/question/14364696

#SPJ4

A framework for all of the entities involved in digital certificates for digital certificate management is known as:

Answers

Answer:

public key infrastructure

Explanation:

Public key infrastructure (PKI) refers to tools used to create and manage public keys for encryption, which is a common method of securing data transfers on the internet. PKI is built into all web browsers used today, and it helps secure public internet traffic. Organizations can use it to secure the communications they send back and forth internally and also to make sure connected devices can connect securely.

The most important concept associated with PKI is the cryptographic keys that are part of the encryption process and serve to authenticate different people or devices attempting to communicate with the network.

Create a timeline of the evolution of computers and their impact on society

Answers

While the conceptual idea after a computer was developed in the 19th century, the first electronic computer was created in the 1940s.

How does the evolution of computers impacts the society?

Computers have transformed the way people relate to one another and their living environment, as well as how humans manage their work, their communities, and their time. Society, in turn, has affected the development of computers via the needs people have for processing data.

What are the evolution of computers?

The first modern computer was built in the 1930s and was called the Z1, which was followed by large machinery that took up whole rooms. In the '60s, computers evolved from professional use to private use, as the first personal computer was presented to the public.

To learn more about computers, refer

https://brainly.com/question/24540334

#SPJ9

Create a timeline of the evolution of computers and their impact on society

Please give answers between 500 words.
What have been the major issues and benefits in
Electronic Data Interchanges (EDI) and Web-Based/Internet
Tools?

Answers

The major issues and benefits of electronic data interchange (EDI) and web-based/Internet tools, such as compatibility and standardization, privacy, cost, dependence on internet connectivity, etc.,

One of the challenges of EDI is that it is ensuring compatibility between different systems and  also establishing standardized formats for data exchange. It requires agreement and coordination among trading partners in order to ensure the seamless communication, while there are many benefits that include EDI and web-based tools that enable faster and more efficient exchange of information, eliminating manual processes, paperwork, and potential errors. Real-time data exchange improves operational efficiency and enables faster decision-making. Apart from this, there are many other benefits to these.

Learn more about EDI here

https://brainly.com/question/29755779

#SPJ4

var w=20;
var h = 15;
rect (10, 10, w, h);
ellipse (10, 10, w, h);
How tall is each one of the shapes?

Answers

The rectangle is 20 units tall and the ellipse is 15 units tall.

How to calculate the height of each of the shapes?

The height of the rectangle is defined by the variable 'h' and is set to 15. The height of the ellipse is also defined by the variable 'h' and is set to 15. So the height of each shape is 15 units.

What is ellipse ?

An ellipse is a geometrical shape that is defined by the set of all points such that the sum of the distances from two fixed points (the foci) is constant. It can be thought of as an oval or a "squashed" circle. In the context of computer graphics and drawing, an ellipse is often used to represent the shape of an object or an area.

Learn more about ellipse in brainly.com/question/14281133

#SPJ1

I’m building a pc name some good parts I need some help on some parts? And prices plz

Answers

Answer:$25

Explanation:

Explain why modern computers consist of multiple abstract levels and describe the main functions of each level

Answers

Modern computers must be quick, effective, and safe, which is why the system was introduced with several abstract layers. Abstract classes can always be used in multilevel inheritance.

Are two abstract methods allowed in a class?

A class can only extend one abstract class in Java, but it can implement numerous interfaces (fully abstract classes). Java has a purpose for having this rule.

Can we use many abstract methods?

The abstract keyword is used to make a class abstract. It may have 0 or more non-abstract and abstract methods. We must implement the abstract class's methods and extend it. It is not instantiable.

To know more about Abstract classes visit :-

https://brainly.com/question/13072603

#SPJ4

PLS HELP ASAP Which is NOT a component of a packet?
trailer (footer)
protocol
body (payload)
header

Answers

Protocol. Hope this helps!
Other Questions
How do airplanes fly? Explain how. Many believe the U.S. Constitution was made to be slow and time consuming. If this is true, why would the Founding Fathers have made the Constitution this way? A. To allow each branch to be held more responsible B. To prevent changes to national laws and processes C. To allow each branch's actions to be checked by another branch D. To allow the American people to have a role in all branches of governmentI have like till the end of the day to finish. this is one of the 18 questions. in the united states, the restriction on imports of products that violate domestic copyright or patent laws is an example of Write the balanced chemical equations for the following word equations:Magnesium+oxygenMagnesium oxide When originally purchased, a truck costing BD 23.000 had an estimated useful life of 8 years and an estimated salvage value of BD 3,000. After 4 years ofstraight-line depreciation, the ascet's total estimated useful life was revised from 8 years to 6 years and there was no change in the estimated salvage valoe. Thedepreciation expense in year 3 cquals:ABD 5,000O & BD 5.750.O CBD 2.875.ODBD 2,500. which permission level on the photos tool does procore recommend you give to collaborators on the project if you want them to upload photos, but not have access to the configuration settings? (b) For the following Cobb-Douglas technology f(ZI,, Zk)=z ZKB Calculate the conditional factor demand functions, cost function and profit function. Which element is thesecond most abundantelement found on Earth?A. OxygenB. CarbonC. SiliconD. Nitrogen What changes did Latin American nations make to economic policy to try to cope with poverty and economic hardships ? Does assessment active mean I passed? solve the equation by using the quadratic formula. x^2+2x=6 what is e-reputation general answers for each of the questions on CAPSIM. your help is much appreciated.What approach did your team take regarding marketing and distributionWhat methods did you use to forecast sales?How did you determine pricing?Which promotion and sales channels did you use to reach your targeted market?Were you successful?How did your team manage its production decisionsWhat plant expansion and improvements were made and why?How did your team manage inventory and stockouts?Which TQM initiatives were adopted and why?What role did human resources play in your decisionsDid it make sense to invest in the productivity improvements offered by the HR module?What was your strategy concerning the labor negotiations?Did you incur a strike? No, we did not.Discuss the Teammate evaluations and whether they were useful. Find the volume of the prism.A triangular prism. The base triangle has a base of 7 feet and height 3 feet. The height of the prism is 5 feet. What are some common health science workplaces? Check all that apply If the government offers to reduce your property taxes by 10 percent if you install solar heating for your home, this would be an example of Write two to three sentences explaining how the suspense within the story makes the climax of Better Wait Till Martin Comes funny. Add (x^3 -2x^2+4) + (2x^3+x^2-2) express in standard form why does imogene player become emotional to this day when recalling her christmas experiences as a child? Would a moon much smaller than our moon exert a gravitational pull on objects, too? How about somethingthe size of a mountain? Or a building? A car? An apple? Describe the effect that mass has on the gravitationalpull of an object.