Which of the following uses graphic symbol to depict the nature and flow of the process? *
1 point
A. FLOWCHART
B. PROCESS
C. CONDITION
D.ARROW LINE​

Answers

Answer 1

Answer:

Flowchart.

Explanation:

It is literally in the name. "flow of the process" -----> Flowchart.

A graphic symbol is a written symbol used to represent speech. A commonly known graphic symbol is an arrow which is used in flow charts to depict the nature and flow of the process.


Related Questions

In a block of addresses we know the IP address of one host is Roll no. Roll no. Roll no. Roll no./20.What is the first address and the last address of this block? Find the number of addresses in the block?
Hint: if your roll no is 33 then your ip address will look like this: 33.33.33.33/20

Answers

Answer:

If there’s one topic that trips people up (both new and experienced) in the networking industry, it is that of Subnetting.

One of the reasons this happens is that one has to perform (mental) calculations in decimal and also binary. Another reason is that many people have not had enough practice with subnetting.

In this article, we will discuss what Subnetting is, why it came about, its usefulness, and how to do subnetting the proper way. To make this article as practical as possible, we will go through many examples.

Note: While subnetting applies to both IPv4 and IPv6, this article will only focus on IPv4. The same concepts explained here can be applied to IPv6. Moreover, subnetting in IPv6 is more of a want rather than a necessity because of the large address space.

IP address network

For example, any traffic with a destination IP address of 192.168.1.101 will be delivered to PC1, while traffic addressed to 192.168.1.250 will be delivered to SERVER.

Note: This is an oversimplification of things just for understanding sake and refers to Unicast (one-to-one) IPv4 addresses. Traffic sent to Multicast (one-to-many) and Broadcast (one-to-all) IP addresses can be delivered to multiple devices. Also, features like Network Address Translation (NAT) allow one IP address to be shared by multiple devices.

To help your understanding of IP addresses and subnetting, you need to resolve the following fact in your head: Computers think in binary, that is, 0s and 1s. Therefore, even though we see an IP address represented like 192.168.1.250, it is actually just a string of bits – 32 bits in total for IPv4 addresses.

To make them more readable for humans, IPv4 addresses are represented in dotted decimal notation where the 32 bits are divided into 4 blocks of 8 bits (also known as an octet), and each block is converted to a decimal number.

For example, 01110100 in binary is 116 in decimal:

A unicast IPv4 address such as 192.168.1.250 can be divided into two parts: Network portion and Host ID. So what does this mean? Well, IPv4 addresses were originally designed based on classes: Class A to Class E. Multicast addresses are assigned from the Class D range while Class E is reserved for experimental use, leaving us with Class A to C:

Class A: Uses the first 8 bits for the Network portion leaving 24 bits for host IDs. The leftmost bit is set to “0”.

Class B: Uses the first 16 bits for the Network portion leaving 16 bits for host IDs. The two leftmost bits are set to “10”.

Class C: Uses the first 24 bits for the Network portion leaving 8 bits for host IDs. The three leftmost bits are set to “110”.

Note: The range of Class A is actually 1-126 because 0.x.x.x and 127.x.x.x are reserved.

With these classes, a computer/device can look at the first three bits of any IP address and determine what class it belongs to. For example, the 192.168.1.250 IP address clearly falls into the Class C range.

Looking at the Host ID portion of the classes, we can determine how many hosts (or number of individual IP addresses) a network in each class will support. For example, a Class C network will ideally support up to 256 host IDs i.e. from 00000000 (decimal 0) to 11111111 (decimal 255). However, two of these addresses cannot be assigned to hosts because the first (all 0s) represents the network address while the last (all 1s) represents the broadcast address. This leaves us with 254 host IDs. A simple formula to calculate the number of hosts supported

Explanation: Final answer is Start address: 192.168.58.0 + 1 = 192.168.58.1

End address: 192.168.58.16 – 2 = 192.168.58.14

Broadcast address: 192.168.58.16 – 1 = 192.168.58.15

What is the next line? >>> tupleB = (5, 7, 5, 7, 2, 7) >>> tupleB.count(7) 3 1 2 0

Answers

Answer:

3 is the next line.

Explanation:

.count literally counts how many something is. so, .cout(7) counts how many 7 there is. you can see that there are 3 number 7s.

What is the next line? >>> tupleB = (5, 7, 5, 7, 2, 7) >>> tupleB.count(7) 3 1 2 0

Which camera settings will cause the amount of light entering the lens to change?

Answers

Answer:

Aperture

Explanation:

Aperture controls the lens' diaphragm, which controls the amount of light traveling through the lens to the film plane.

clicker game creating in code.org (PLEASE HELP FAST!!!)

clicker game creating in code.org (PLEASE HELP FAST!!!)

Answers

Use code.org's visual programming tools to create a clicker game by adding buttons, score tracking, and event handlers.

To create a clicker game in code.org, you can use the visual programming tools available.

Follow these steps:

1) Start by designing the game interface.

Add buttons, labels, and any other elements you want to display.

2) Create a variable to track the score or points in your game.

Initialize it to 0.

3) Add an event handler to the button's click event.

When the button is clicked, increment the score variable by a specific amount.

4) Update the score display to reflect the updated score value.

5) Consider adding a timer or level system to make the game more challenging.

6) Add sound effects or animations to enhance the user experience.

7) Test and debug your game to ensure it functions as intended.

8) Share and enjoy your clicker game with others.

For more such questions on Visual programming:

https://brainly.com/question/29362725

#SPJ11

Pseudocode finding the sum of the number 12, 14, 16

Answers

Answer:

Pseudocode:

1. Initialize a variable named 'sum' and set it to 0.

2. Create an array named 'numbers' containing the numbers 12, 14, and 16.

3. Iterate over each number in the 'numbers' array.

  3.1 Add the current number to the 'sum' variable.

4. Print the value of 'sum'.

Alternatively, here's an example of pseudocode using a loop:

1. Initialize a variable named 'sum' and set it to 0.

2. Create an array named 'numbers' containing the numbers 12, 14, and 16.

3. Initialize a variable named 'index' and set it to 0.

4. Repeat the following steps while 'index' is less than the length of the 'numbers' array:

  4.1 Add the value at the 'index' position in the 'numbers' array to the 'sum' variable.

  4.2 Increment 'index' by 1.

5. Print the value of 'sum'.

Explanation:

1st Pseudocode:

1. In the first step, we initialize a variable called 'sum' and set it to 0. This variable will be used to store the sum of the numbers.

2. We create an array named 'numbers' that contains the numbers 12, 14, and 16. This array holds the numbers you want to sum.

3. We iterate over each number in the 'numbers' array. This means we go through each element of the array one by one.

3.1 In each iteration, we add the current number to the 'sum' variable. This way, we accumulate the sum of all the numbers in the array.

4. Finally, we print the value of the 'sum' variable, which will be the sum of the numbers 12, 14, and 16.

2nd Pseudocode using a loop:

1. We start by initializing a variable called 'sum' and set it to 0. This variable will store the sum of the numbers.

2. Similar to the first pseudocode, we create an array named 'numbers' containing the numbers 12, 14, and 16.

3. We initialize a variable called 'index' and set it to 0. This variable will be used to keep track of the current index in the 'numbers' array.

4. We enter a loop that will repeat the following steps as long as the 'index' is less than the length of the 'numbers' array:

4.1: In each iteration, we add the value at the 'index' position in the 'numbers' array to the 'sum' variable. This way, we accumulate the sum of all the numbers in the array.

4.2: We increment the 'index' by 1 to move to the next position in the array.

5. Finally, we print the value of the 'sum' variable, which will be the sum of the numbers 12, 14, and 16.

flodding on rivers is caused by human activity rather than natural events true or false

Answers

Answer:

True

Explanation:

While I believe it's a compendium of the both(both true and false), I when asked to pick just one, I would go with yes. They're are lots of things we humans do on a general note that causes flooding. Although, heavy rainfall can also cause flooding and that's not as a result of human activity, but directly. But then, activities like not maintaining a dam, or erecting a structurally failed dam can cause flood to occur at any point in time, without warning even. Another way is when due to our activities, we block the rivers, this can also lead to flooding exactly like the case of heavy rainfall does. Lack of good drainage facilities, drainage wouldn't create itself, we as humans do. When we don't were essentially creating an excuse for an eventual happening of flood.

Succinctly put, human activities also cause floods, as much as natural events causes flood.

Write a function: void pushZero(int[] A) that accepts an integer array A. The function should convert the original array as per above requirement.

Answers

Answer:

The function is as follows

public static void pushZero(int[] A){

    int curr = A.length - 1;

       for (int i = A.length - 1; i >= 0; i--) {

           if (A[i] != 0) {

               A[curr] = A[i];

               curr--;

           }        }

       while (curr >= 0) {

           A[curr] = 0;

           curr--;        }

       for (int i = 0; i < A.length; i++) {

           System.out.print(A[i] + " ");

       } }

Explanation:

Given

See attachment for complete question

Required

Write a function to move all 0s to the beginning of the array

The function is defined here

public static void pushZero(int[] A){

This sets the current element to the last element

    int curr = A.length - 1;

This for loop through the array backwards

       for (int i = A.length - 1; i >= 0; i--) {

This condition checks if the current element is not 0

           if (A[i] != 0) {

Set the current element to the current iterating element of the array

               A[curr] = A[i];

               curr--;

           }        }

This while iteration is repeated while the current element is greater than 0

       while (curr >= 0) {

Set current element to 0

           A[curr] = 0;

           curr--;        }

The following for loop prints the sorted array

       for (int i = 0; i < A.length; i++) {

           System.out.print(A[i] + " ");

       } }

Write a function: void pushZero(int[] A) that accepts an integer array A. The function should convert

Read and Answer the Question.


After several years of driving long-haul trucks, Joe Blanka

founded his own trucking company, Blanka Transport Inc.

(BTI), which specialized in less-than-truckload shipments in the

midwestern part of the United States. Joe developed a successful

method for scheduling BTI’s runs that met or exceeded the

delivery expectations of its customers. As a result, BTI shipments were growing at a rate between 15 and 20 percent per

year. The growth, however, was not evenly distributed across

BTI’s territory. On some routes, capacity was overloaded in one

direction and underloaded in the other.

Joe noticed that the imbalance problem was not stable

across time. In some months, capacity was short in one direction, and in other months, it was short in another direction. He

thought that one way of solving the problem would be through

marketing, by offering incentives to customers whose shipments

would improve load balance. Another approach to the problem

was to analyze and restructure the route–equipment combinations. He also thought that it might be possible to warehouse

some less-urgent shipments for short periods in order to help

the balance.

Joe’s son, the first member of the Blanka family to attend

college, was a senior in engineering school. He had just completed a course in project management, and after briefly describing some of the basic concepts to his father, he suggested that a

process improvement project might be a good way to deal with

the balance problem. He thought that the Marketing Manager

and the Route Manager could serve as project co-managers. He

also felt that some of the older, more experienced drivers might

be helpful. The objective of the project would be to decrease the

size of the route imbalances by 75 percent in 1 year.


Questions: Is this a proper approach to the problem? Is this a “project”; if

so, what are the three triple constraints? What, if any, helpful

suggestions would you make to Joe?

Answers

Yes, the process improvement project suggested by Joe's son is a proper approach to address the balance problem in the trucking company. It can help decrease the route imbalances by 75 percent in one year.

What are the constraints?

The three triple constraints in this project would be scope (reducing route imbalances), time (1 year), and resources (including the Marketing Manager, Route Manager, and experienced drivers).

Some helpful suggestions for Joe would be to consider implementing a combination of marketing incentives, route restructuring, and short-term warehousing to achieve better load balance.

Additionally, he should ensure effective communication and collaboration between the project co-managers and team members to maximize the project's success.

Read more about project development here:

https://brainly.com/question/27995740

#SPJ1

Define a generic method called checkOrder() that checks if four items are in ascending, neither, or descending order. The method should return -1 if the items are in ascending order, 0 if the items are unordered, and 1 if the items are in descending order.

Answers

Answer:

function checkOrder(arr) {

const asc = [...arr].sort();

if (arr.toString() === asc.toString()) return -1;

const desc = [...arr].sort((a,b) => b-a);

if (arr.toString() === desc.toString()) return 1;

return 0;

}

function test(arr) {

switch(checkOrder(arr)) {

 case -1:

  console.log(`${arr}: these numbers are ascending`);

  break;

 case 0:

  console.log(`${arr}: these numbers are unordered`);

  break;

 case 1:

  console.log(`${arr}: these numbers are descending`);

  break;  

}  

}

test([1,2,3,4]);

test([7,5,3,1]);

test([2,3,1,7]);

Explanation:

This is a solution using javascript.

Which of the following is part of an effective memo? Select one.

Question 9 options:

Subjectivity in the content


Audience orientation


Vague subject


Indirect format

Answers


An effective memo should be audience-oriented, meaning it is written with the intended readers in mind. It takes into consideration their needs, knowledge level, and preferences. By focusing on the audience, the memo can effectively convey its message, provide relevant information, and address any concerns or questions the readers may have. This approach increases the chances of the memo being well-received and understood by its intended recipients.

what member of an organization should decide where the information security function belongs within the organizational structure? why?

Answers

Answer:

Chief Information Officer (CIO) should be responsible for the overall management of information and data within the organization, and as such, is in the best position to understand the risks and vulnerabilities associated with this information.

The CIO can ensure that the information security function is able to effectively protect the organization's information and data, while also supporting the organization's business objectives.

I need to create a python program with these guidelines can someone please help me.
It needs to be a list of numbers

Take inputs and add them to the list until there at 10 items.
- Prints the initial list and a count of the items in the initial list
- Sums all the items in the list and prints the sum.
- Multiplies all the items in the list and prints the product.
- Gets the largest number from the list.
- Gets the smallest number from the list.
- Removes the largest and smallest numbers from the list.
- Prints the final list and a count of the items in the final list.

Answers

l=[]

for x in range(10):

   l.append(float(input('Enter a number: ')))

print(str(l)+'\n'+'There at '+str(len(l))+' items in the list')

print('The sum of the elements in the list is: '+str(sum(l)))

t=1

for x in l:

   t*=x

print('The product of the elements in the list is: '+str(t))

print('The largest number in the list is: '+str(max(l)))

print('The smallest number in the list is: '+str(min(l)))

l.remove(max(l))

l.remove(min(l))

print(str(l)+'\n'+'There are '+str(len(l))+' items in the list')

I wrote my code in python 3.8. I hope this helps

The top left corner of the Excel UI contains commands that are frequently used and is customizable. What is the name
of this area?
O window controls
O status bar
O ribbon
O Quick Access toolbar

Answers

Answer:

Explanation:

The "Office" button is located in the upper left corner of the window. Clicking the button displays a menu of basic commands for working with files, a list of recent documents, and a command for configuring application settings (for example, Excel Options).

Which careers use web browsers
Teacher

Computer programmer

Mechanic

Cosmetologist

Park ranger

Answers

All of the above. If that’s not an option if it’s multiple choice let me know. Everyone uses web browser/the internet no matter the career.

Which of the following could be considered an algorithm?


directions for assembling a bicycle


the pages in a book


a file system directory


an application
F

Answers

The best answer is an application

Label the following website navigation methods
according to their importance, where 1 is most
important and 3 is least important.

Site map:
Navigation menu:
Site search:

Answers

Answer:

Technology is very important

Answer:

Site map: 3

Navigation menu:1

Site search:2

Explanation:

You are the network administrator for your company. A user reports that he cannot access network resources from his computer. He was able to access the resources yesterday. While troubleshooting his computer, you find that his computer is issued an Automatic Private IP Addressing (APIPA) address. All the network equipment in the user's computer is functioning properly because you are able to access the user's computer from a remote computer. What is most likely the problem

Answers

Answer:

the issued Automatic Private IP Addressing (APIPA) address.

Explanation:

Since we are told that the user was able to access the network resources yesterday, and all the network equipment in the user's computer is functioning properly, there is a very high possibility that because the user's computer has been issued an Automatic Private IP Addressing (APIPA) address, it affected his computer's ability to connect to a public network.

This is the case because private network IP addresses are known to prevent inflow and outflow of data onto public networks.

The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption, but can be adapted to work with any implementation that does not run in fixed time.
A. mathematical.
B. timing.
C. chosen ciphertext.
D. brute-force.

Answers

Answer:

chosen ciphertext

Explanation:

Chosen ciphertext attack is a scenario in which the attacker has the ability to choose ciphertexts C i and to view their corresponding decryptions – plaintexts P i . It is essentially the same scenario as a chosen plaintext attack but applied to a decryption function, instead of the encryption function.

Cyber attack usually associated with obtaining decryption keys that do not run in fixed time is called the chosen ciphertext attack.

Theae kind of attack is usually performed through gathering of decryption codes or key which are associated to certain cipher texts

The attacker would then use the gathered patterns and information to obtain the decryption key to the selected or chosen ciphertext.

Hence, chosen ciphertext attempts the use of modular exponentiation.

Learn more : https://brainly.com/question/14826269

# ANSWER THE FOLLOWING
1 list and describe the information system based in business
2 give the difference between information poor and information rich society
3 define the system and give the characteristics​

Answers

Answer:

hardware, software, database, network, and people

Help with Wireshark, OSI layer, network frame sequence numbers, protocols and interpret ping traffic.
Ping example setup
Our first exercise will use one of the example topologies in IMUNES. Click File/Open and open the file in this path:
/root/imunes-examples/Ping/ping.imn
Rename the 'pc1', 'pc2' and 'server' nodes to include your UNCC username (e.g., pc1-jsnell2). Take a screenshot of your updated network and upload it here.
In your emulation, what is the percentage of packets indicated by Wireshark for the network layer? If you have multiple network layer protocols listed in your emulation, enter the sum of percentages for them. Just indicate the number.
Close the protocol hierarchy statistics, minimize Wireshark and go back to the IMUNES main screen.
Double-click on your renamed pc1. Type the following command into the terminal window that opens and press enter:
ping 10.0.8.10
(For your information, this command repeatedly attempts to send packets of communication from the current node to the node with the IP address indicated in the command)
Hit CTRL-C to stop the ping after at least five lines of output have been obtained.
Open the Wireshark window you had minimized. Scroll down within the top window (you may need to increase the size of the top window in Wireshark).

Answers

In the given exercise, you are using the IMUNES topology with Wireshark to analyze network traffic. To find the percentage of packets indicated by Wireshark for the network layer, follow these steps:

1. Run the ping command as instructed in the exercise, and make sure to capture the traffic in Wireshark.
2. In Wireshark, click on "Statistics" in the menu bar and select "Protocol Hierarchy."
3. In the "Protocol Hierarchy Statistics" window, you will see a list of protocols organized by OSI layers.
4. Locate the network layer protocols (such as IP, IPv6, ARP) and note their percentages.
5. Add up the percentages of the network layer protocols to get the total percentage for the network layer.

Since the actual network traffic captured in your exercise is not provided, it is not possible to provide a specific percentage number. Follow the above steps to find the percentage of packets for the network layer in your captured traffic.

When answering questions on the platform Brainly, you should always be factually accurate, professional, and friendly. You should also be concise and not provide extraneous amounts of detail. It is important to use the following terms in your answer, such as "window," "network," and "sequence."Regarding the Wireshark, OSI layer, network frame sequence numbers, protocols, and interpreting ping traffic:When pinging from pc1, what is the percentage of packets indicated by Wireshark for the network layer?If you have multiple network layer protocols listed in your emulation, enter the sum of percentages for them. Just indicate the number.To find the percentage of packets indicated by Wireshark for the network layer when pinging from pc1, follow these steps:Close the protocol hierarchy statistics, minimize Wireshark, and go back to the IMUNES main screen.Double-click on your renamed pc1.Type the following command into the terminal window that opens and press enter:ping 10.0.8.10 (This command repeatedly attempts to send packets of communication from the current node to the node with the IP address indicated in the command)Hit CTRL-C to stop the ping after at least five lines of output have been obtained.Open the Wireshark window you had minimized.Scroll down within the top window (you may need to increase the size of the top window in Wireshark).The percentage of packets indicated by Wireshark for the network layer when pinging from pc1 is 100%.This is because the ICMP protocol used by the ping command is part of the network layer, and all packets captured by Wireshark were ICMP packets. There were no packets captured by Wireshark at other OSI layers such as the transport layer (TCP or UDP).

To know more about network click here

brainly.com/question/14276789

#SPJ11

Assume aList is a valid ArrayList containing the following string values:
apple, orange, grape, kiwi, watermelon, peach, banana
When the following statement executes, what does aList contain?
aList.set(3, "lemon");
A.apple, orange, grape, kiwi, lemon, peach, banana
B.apple, orange, grape, lemon, watermelon, peach, banana
C.apple, orange, grape, kiwi, lemon, watermelon, peach, banana
D.apple, orange, lemon, grape, kiwi, watermelon, peach, banana
E.apple, orange, grape, kiwi, watermelon, peach, banana, lemon, lemon, lemo

Answers

If aList is a valid ArrayList containing the given string values. Then, aList will contain B. apple, orange, grape, lemon, watermelon, peach, banana.

What is the reasoning behind this answer?

The statement aList.set(3, "lemon") replaces the element at index 3 in the list with the value "lemon". In this case, the element at index 3 is "kiwi", so after executing the statement, the list will contain "apple, orange, grape, lemon, watermelon, peach, banana".

What is ArrayList?

ArrayList is a dynamic data structure in Java that implements the List interface and provides resizable arrays to store elements. It is a commonly used collection for storing and manipulating a large number of elements, allowing to add, remove, access and modify elements by their index efficiently. ArrayList is also known for its flexibility, as it can store elements of any object type.

To learn more about ArrayList, visit: https://brainly.com/question/20464124

#SPJ4

Data analytics benefits both financial services consumers and providers by helping create a more accurate picture of credit risk.
True
False

Answers

Answer:

True

Explanation:

fill in the black
................. is concerned with recording, arranging filing, processor retrieving and disseminating of information. ​

Answers

Answer:

information processing is concerned with recording arranging processing retrieving and disseminating of information


What were the first microblogs known as?
OA. tumblelogs
O B. livecasts
OC. wordpower
O D. textcasts

Answers

Answer:

the right answer is A

.....

Answer:

tumblelogs

Explanation:

What characteristics are common among operating systems

Answers

The characteristics are common among operating systems are User Interface,Memory Management,File System,Process Management,Device Management,Security and Networking.

Operating systems share several common characteristics regardless of their specific implementation or purpose. These characteristics are fundamental to their functionality and enable them to manage computer hardware and software effectively.

1. User Interface: Operating systems provide a user interface that allows users to interact with the computer system. This can be in the form of a command line interface (CLI) or a graphical user interface (GUI).

2. Memory Management: Operating systems handle memory allocation and deallocation to ensure efficient utilization of system resources. They manage virtual memory, cache, and provide memory protection to prevent unauthorized access.

3. File System: Operating systems organize and manage files and directories on storage devices. They provide methods for file creation, deletion, and manipulation, as well as file access control and security.

4. Process Management: Operating systems handle the execution and scheduling of processes or tasks. They allocate system resources, such as CPU time and memory, and ensure fair and efficient utilization among different processes.

5. Device Management: Operating systems control and manage peripheral devices such as printers, keyboards, and network interfaces. They provide device drivers and protocols for communication between the hardware and software.

6. Security: Operating systems implement security measures to protect the system and user data from unauthorized access, viruses, and other threats.

This includes user authentication, access control mechanisms, and encryption.

7. Networking: Operating systems facilitate network communication by providing networking protocols and services. They enable applications to connect and exchange data over local and wide-area networks.

These characteristics form the foundation of operating systems and enable them to provide a stable and efficient environment for users and applications to run on a computer system.

For more such questions characteristics,click on

https://brainly.com/question/30995425

#SPJ8

The catch clause ________. follows the try clause contains code to gracefully handle the exception type listed in the parameter list starts with the word catch followed by a parameter list in parentheses containing an ExceptionType parameter variable The catch clause does all of these

Answers

Answer:

all of these

Explanation:

The catch clause satisfies the following:

1. It starts with the word catch followed by a parameter list in parentheses containing an Exception Type parameter variable.

2. It follows the try clause.

3. It contains code to gracefully handle the exception type listed in the parameter list.

So, option ''all of these'' is correct

Quick please, URGENT

1.Explain why the scenario below fails to meet the definition of due diligence in coding.

Situation: As you are developing an app for a small fee, you include access to many other services, such as searching the Internet.


3.A programmer must know platforms and other languages. On what "side" is Groovy?

programmer side

Web-based side

server-side

client-side

4.Give two reasons why there are more contract workers than permanent workers

5.Explain why the scenario below fails to meet the definition of an app with persona.

Situation: Jim built an app for a company in which the user navigates a Web site by clicking on links and reading written material.

6.Explain why the scenario below is not a description of an angel investor.

Situation: Ray has an idea for developing an app and finds individuals who will invest in the app. These individuals sign an agreement that they expect no money or rights in the app.

7.In an app design project, who is responsible for the SDKs?

the programmer

the developer

the senior executive

the senior staff

8.Suppose you are offered a position that focuses on writing policies, hiring staff, and focusing on the company's mission. What position are you offered?

legal executive

technology executive

resources executive

programming executive

Answers

Answer: it is the code it is wrong

Explanation:

Dev10 is an Active Directory Domain Services (AD DS) domain member that runs Windows 10 Enterprise.
Dev10 is used by the development department for version alpha testing of applications under development.
A specific domain user account named DevTester is used exclusively for alpha testing.
The company has an Office 365 E3 subscription. DevTester is not configured as a subscriber.
You prepare to install a new application version for testing.
You need to be able to revert to the software, settings, and original data files from before testing as quickly
as possible.
Solution: You create a system restore point before installing the application.

Answers

Do I suppose to answer a question please let me know

Television broadcasts were originally delivered by using which technology

Answers

Answer:

Wireless technology.

Explanation:

In earlier years, the broadcasting of information or any video or audio type was done "over-the-air". This means that sharing or the distribution of any content was done "wireless", through the use of transmitters that are wireless or requires no physical connecting wires.

Wireless technological form of broadcasting became the original form of distributing media, be it entertainment, news or information, etc. This 'over-the-air' broadcasting was then replaced by the cabled-wires transmission later on.

The technology through which Television broadcasts were originally delivered was through:

Wireless technology.

According to the given question, we are asked to state the technology through which Television broadcasts were originally delivered

As a result of this, we can see that in the earlier years, there was the use of wireless technology to relay the transmissions of information through radio waves or short waves and did not require any physical connection of wires.

'Read more about Wireless technology here:

https://brainly.com/question/25633298

The postmortem lesson learned step is the last in the incident response process. Why is the most important step in the process?

Answers

The most important step in the process of the learned step that came last in the incident response process is to know how this threat happened and how to prevent it in the future.

What is Post-Mortem?

This refers to the medical examination of a dead body, to determine the cause of death and other possible factors that can also help to solve a murder.

Hence, we can see that from the complete text, there was a learning process that was used to teach the incident response process and this was done to help in threat prevention.

Read more about post-mortem here:

https://brainly.com/question/21123962

#SPJ1

Other Questions
1963: The Year That Changed Everything summary every paragraph (x-2)=9 in stanrard form You purchase a plant and begin measuring its height each day. This plant grows the same amount each day. When you got it, it was 10 cm tall. The next day it was 13 cm tall. The day after that it was 16 cm tall. How tall will it be one week after you purchased it? Who makes, enforces and interprets laws?None of the answers are correctConcurrent or Shared PowersDelegated to the National GovernmentReserved to the State Governments At a dog breeder's property, 25 of the 60 dogs are black Labradors. This is 23 of the total black dogs.How many black dogs are there in total? 3-a. Prepare Wells Technical Institute's income statement for the year. 3-b. Prepare Wells Technical Institute's statement of retained earnings for the year. The Retained Earnings account balance was $77,000 on December 31 of the prior year. 3-c. Prepare Wells Technical Institute's balance sheet as of December 31. A jet travels 1198 miles against the wind in 2 hours and 1438 miles with the wind in the same amount of time. What is the rate of the jet in still air and what is the rate of the jet wind? Rate of the jet still in the air: x mi/hRate of the wind: x mi/h can someone hep me with this? which of these organs stores the bile from the liver until it is needed in the small intestine? Unlike many places in the world, Europe's forests are actually increasing.O TrueO False What causes the BottleneckEffect?A. a new species diverges from theoriginal population and develops newallelesB. when a few individuals join apopulation and cause a shift in theallele frequencyC. a large loss in the population due toa dramatic event this is the answer D. when a few individuals leave apopulation to begin their own4 A green grocer has 180 mangoes to sell. She has to arrange them in piles of 9, 10 or 12mangoes.In which ways would she arrange the mangoes without any remaining? PLS HELP WITH MY PYTHON HW ILL GIVE YOU BRAINLIEST Consider the following tenminus year project. The initial afterminus tax outlay or afterminus tax cost is $1,500,000. The future afterminus tax cash inflows each year for years 1 through 10 are $400,000 per year. What is the payback period without discounting cash flows? How does the discussion of the attack on Fort Sumter in paragraphs 2-4 help readers understand how important the fort was to the North?(write paragraph) Brittany wrote a paper about the types of beverages that are available in her school cafeteria. Which text structure best suits the purpose of this text?A. cause and effect structureB. classification structureC. compare and contrast structureD. definition structureE. narrative structure Where was the first publishing house built?a Englandb. Francec. Germanyd. SpainPlease select the best answer from the choices provided minerals dated by radioactive isotopes in a sedimentary rock are usually: group of answer choices older than the sedimentary rock the same age as the sedimentary rock unreliable younger than the sedimentary rock has anybody taken this-?1. Give 3 possible reasons for the Civil War given in the background essay.2. Give 1 detail for for each those reasons.3. What is the analytical question for the DBQ? _______________________________________________ _________________________________________________________________4. What two terms must be defined in the question? Define or expain each _____________________________________________________________________________________ __________________________________________________________________5. Restate the analytical question in your own words. _____________________________________________ ____________________________________________________________________ which of the following electromagnetic waves is used to probe the crystalline sctructure of matter? a. microwaves b. power waves c. x-rays d. am radio waves e. visible light