Answer:
We cant help with this
Explanation:
you need to use the game it talks about
Walt needs to ensure that messages from a colleague in another organization are never incorrectly identified as spam. What should he do?
A.Configure a safe recipient.
B.Configure a blocked sender.
C.Configure a safe sender.
D.Do nothing.
Answer:
C. Configure a safe sender
Explanation:
It’s dabest thing to do
As per the given scenario, Walt should need to configure a safe sender. The correct option is C.
What is configuration?A system's configuration in communications or computer systems refers to how each of its functional elements is organised in relation to their nature, number, and distinguishing features.
Configuration frequently involves picking the right hardware, software, firmware, and documentation.
A person, group, or organisation that starts the communication is known as the sender. The success of the message stems primarily from this source.
The communication is influenced by the sender's experiences, attitudes, knowledge, competence, perspectives, and culture.
Walt must take care to prevent messages from a colleague in a different organisation from ever being mistakenly classified as spam. He ought to set up a secure sender.
Thus the correct option is C.
For more details regarding configuration, visit:
https://brainly.com/question/13410673
#SPJ2
When should a developer begin thinking about scalability?
during the design phase
when traffic increases by 25 percent
when the system is available to users
during testing
Answer:
read description:
Explanation:
You should think about scalability before the first line of code is written. You should think about scalability before the first line of code is written. This doesn't mean that you build out some massive infrastructure on the off chance your game might be a hit.
A developer should begin thinking about scalability during the design phase. The correct option is fourth one.
What is scalability?This means one can afford to spend money on optimizing for scalability .One can't go from zero users to ten million overnight. If one keep an eye on the system's performance, one will have plenty of time to optimize when the time comes.
It needs to keep scalability in mind while writing the code. So, scalability before the first line of code is written.
Thus, a developer should begin thinking about scalability during the design phase.
Learn more about scalability.
https://brainly.com/question/13260501
#SPJ2
why does my Chromebook keep on turning my new tabs into clever tabs?
Answer:
Ok, so it's not letting me submit a text response, so I'll attach an image of my answer.
Explanation:
What do the stapedius and gluteus maximus have in common?
this is a science question
Answer:
What do the stapedius and gluteus maximus have in common? They move the hips and thighs. They are attached to bones. They are the largest muscles.
Explanation:
Answer:
Explanation:
......lo siento, no sé esto
What do the Brainly points do? sorry im new here and i dont know how to internet rn .-.
also you get points for this i guess :)
Answer:
Hii, Welcome to brainly!
Explanation:
Basically, if you have points, you can ask your own questions. If you answer people's questions, you get points. You can also get leveled up by points. (or ranks) For example, Beginner is starts from 0 points and 0 brianliest. Then there's Helping Hand. You can get helping hand by having 100 points. Then there's Ambitious which starts off with 250 points. You can get Brainliest when you answer someone's question and they think you answered with the best answer. You also get points when you get Brainliest. One way to earn many points is by doing any challenges. The first challenge is to answer 5 questions in 48 hours/2 days and you get 50 points. There's a lot to learn about brainly i didn't cover all of it but i hope this helps!
What is another name for 1000 bytes?
1. terabyte
2. gigabyte
3. kilobyte
4. megabyte
Answer:
Another name for 1000 bytes is 1 kilobyte.
Option 3
Explanation:
Which of the following lines of code creates a division called answer?
A.
B.
C.
D.
Answer:
Explanation:
NO LINKS!! HELP!! ESSAY DUE TODAY!!!
Answer:
To the "Am not 13"
Explanation:
Amy Bernstein wrote a story, which is titled "I'm Not Thirteen Yet." The story is told from the perspective of one of the characters, making it a personal narrative. The story's author describes his personal experiences throughout the narrative. 'I had entered the world of teenagers, and I wasn't even one of them yet,' says the author, demonstrating that he is writing about his own experiences.
ok 2 things please 1. i need one more question to add if u can come up with anything or what not and 2. please answer the following questions in the picture i need as many answer a s posable por favor nod nod thank youu
Answer:
5 siblings, 1 trip per month, 14 age, 12 hours of sleep, 2 hours games, 5 pairs of shoes owned
Explanation: i don't know if this is what u meant, but i hope this helps....
Match List
Match each term to its definition.
Put responses in the correct input to answer the question.
Correct answers:
1
a value that can be passed to a function
2
a group of instructions that can be used to organize a program or perform a repeated task
3
a value that can be passed from a function back to the calling part of a program
Answer:
parameter: a value that can be passed to a function
function: a group of instructions that can be used to organize a program or perform a repeated task
return value: a value that can be passed from a function back to the calling part of a program
Explanation:
Experts believe robots and AI will continue taking over many of the human jobs we know today. What changes should be made to K-12 education to ensure students are prepared for the future? What courses or skills should be added? WHat should be removed? Why?
Answer:
I think they should show one subject per month so students are more prepared
Answer: some changes that should be made are dresscode , some courses should be more sports . Nothing should be removed because the kids in the future need to learn more .
Explanation:
ill give Brainliest!!!!! I REALLYYY NEED HELP
i have to do journals for computers, and its a free topic....... make a topic and give me a four sentence journal PLSSSS this question Worth 28 points too
Answer:
Topic: Alexander the great
Alexander was born in July 356 B.C. to Philip II and his wife, Queen Olympias.He was tutored by a philosopher named ‘Aristotle’,he taught Alexander about medicine, philosophy, morals, religion, logic, and art.His full name is ‘Alexander ||| of Macedon’.He died on June 323 B.C and people still don't know how he was killed.A lot of people say that he was killed by poison but nobody really has proof.But despite him being killed he was famous for being the King of Macedonia and conqueror of the Persian Empire. He was a great military leader in fact he is one of the BEST known
An example of how a merge code would appear in a letter would be _____.
Answer:
Space blank
Explanation:
It means the question needs you to answer the question
Answer:
An example of how a merge code would appear in a letter would be C i.e. /University_Name/. Explanation: Merge codes help speed up the method of making letters by inserting data into your letters.
Explanation:
I hope this helps
A friend of a friend needs a place to stay. He’s offered you $200 to camp out in your living room.
WHAT DO YOU WANT TO DO?
(A.)SAY YES
(B.)SAY NO
Answer:
A.
i wouldn't say no to that Who would?
Explanation:
Jackie is planning a birthday party for her little brother and is researching different trampoline parks. She receives a pop-up asking for her name, address, and date of birth so she can receive a special promotion from the trampoline park. What should Jackie do?
a
Ignore the request and not enter any personal information.
b
Provide only her name and date of birth.
c
Provide only her name and address.
d
Provide the requested information to receive the discount.
Answer:
a
Explanation:
sis is gonna get scammed
Answer:
a
Explanation:
You dont know who is getting your information and it is not someone you know. STRANGER DANGER!
How does a resident virus differ from a non-resident virus? !!!25 POINTS!!!!!
A) Resident viruses simply disrupt operations while non-resident viruses will control hosts.
B)Resident viruses will control hosts while non-resident viruses simply disrupt operations.
C)Resident viruses find networks to infect while non-resident viruses load themselves into memory.
D)esident viruses load themselves into memory while non-resident viruses find networks to infect.
Answer:
The correct answer is **D)** Resident viruses load themselves into memory while non-resident viruses find networks to infect. A resident virus is a type of computer virus that’s deployed and resides within a computer’s random access memory (RAM). A non-resident computer virus, on the other hand, is a type of computer virus that doesn’t reside within a computer’s RAM. Non-resident computer viruses can still be deployed within RAM, but they don’t stay there.
Which of these represents information that is fact-based, measurable, and observable?
objective information
predictive information
subjective information
interpretive information
Answer: objective information
QUICK 50 POINTS WILL GIVE BRAINLY!!!
Write pseudocode for getting a bowl of ice cream using at least four steps.
Answer:
1. grab a bowl spoon and ice cream
2. take your spoon and put a desired amount of ice cream
3. add topping if needed
4. clean up and enjoy!!
Explanation:
What is involved with individual user-testing?
You individually test every minor detail and aspect of your game, keeping a
running list of your individual observations and noting things you would like to
change.
You ship your game out to several hundred users and ask them to fill out a
reflection survey and send it back to you after they test your game.
You observe a user playing your game or prototype by them recording
themselves while playing remotely or, more ideally, you observe a user playing
your game in person.
You choose five professional gaming individuals to test your game and create a
reflective report regarding what they liked and didn't like.
Answer:
the middle one would make the most sense if not than it is the 3rd
Explanation:
Question: How do you file a complaint using a food restaurant? 100 POINTS WILL BE GIVEN INCLUDING BRAINLIEST
send it through the mail
Answer: Be prepared to provide the following information:
1.Your Name, Address and Phone Number (your information will remain anonymous to the restaurant)
2.Name of restaurant
3.Location/address of the restaurant
4.Date of incident
5.Nature of complaint
If you suspect you became ill from this incident. You will need to give specific information about the suspected foods that made you sick, as well as when your symptoms began, and what they were. In addition, you will need to give a 3-day food eating history.
Explanation
Give three examples of ethical or legal issues that an IT professional may encounter and the negative consequences of these issues.
Answer:
1. Private Informations being leaked.
2. Hackers that hacks accounts.
3. Computer Viruses obtained by clicking spam messages.
Explanation:
1. They can turn down the leaked informations by logging to it, legally.
2. IT Professionals could hack the hacker, or outsmart them.
3. Some people can stop Computer Viruses, but IT Professionals can prevent it much better than them.
I hope that my answer helped you. Thank you, and good luck.
The three examples of ethical or legal issues that an IT professional may encounter are:
Privacy violationsCybersecurity breachesIntellectual property violationsWhat are the negative consequences of the issues with IT professional?In Privacy violations: IT professionals may be faced with ethical dilemmas related to the collection, use, and protection of personal data. If personal data is not handled responsibly, it can lead to privacy violations, loss of trust, and potential legal consequences.
In Cybersecurity breaches: IT professionals are responsible for protecting the security of systems and data, and failure to do so can result in cybersecurity breaches that can have serious consequences, such as data loss, financial damage, and reputational harm.
Therefore, in Intellectual property violations: IT professionals may be faced with ethical issues related to the use of copyrighted or patented materials. If these materials are used without permission, it can result in legal consequences and damage to the reputation of the IT professional and their organization.
Learn more about IT professional from
https://brainly.com/question/6947486
#SPJ1
aaaaaaaaaaaaaaaaplssssssssssssssssssssssssssssshelpppppppppppppppppppppppp
Answer:
Voltage=50
Explanation:
V = I × R
V= I × 50
V = 50
V = Potential difference in volts
R = Resistance in ohms
I = Current in amps (amperes)
Write two sentences but each one having either computer in it or technology in it. You can use a word more than once in a sentence and you can put the same word in more than one sentence.
Answer:
Sentences:
1.My computer has a virus
2.Technology may take over the world someday
Explanation:
What does a loop statement do?
It causes a section of code to be repeated a certain number of times.
It causes a section of code to be executed one time only.
It causes a section of code to end.
It causes a section of code to be repeated infinitely.
Answer:
It causes a section of code to be repeated infinitely
Answer:
It causes a section of code to be repeated a certain number of times.
Explanation:
(Will give brainliest) How does the new technology concept work?
Answer:Technology has completely changed the way companies collaborate. Technology has helped us connect with people anywhere and at any time. This increased collaboration has brought a high level of flexibility in communication that allows employees, co-workers, and managers to connect with each other easily
Explanation:
gogle is great my friend (yes i spelllled it wrong. it wouldnt let me put the word)
technology concepts as framed by three areas of study being physical products, human processes and environmental systems which include concepts such as: structures, materials, mechanisms, power and energy, control, systems, functions, aesthetics and ergonomics.
Hope this helps!
1. What do you think is the most important event in the history of the internet? What event has had the biggest impact on your daily life?
Answer:
The biggest event in internet history was YuTubers punching each other in the face. Months of hype came to a peak Saturday for the self-declared “biggest event in internet history” a boxing match between two YuTube celebrities in Manchester, England.
Explanation:
There is no particular event but the whole journey till now which shaped my personality. Every person even if they are the worst has something good in them.
Which file type is typically used to save Microsoft Word files? Group of answer choices DOC MPEG PDF XLSX
Answer:
DOC
Explanation:
It's the common file used.
When the prompt function is used in JavaScript, _____ appears.
A.
an error message
B.
a pop-up box
C.
a data warning
D.
a password request
Answer:
B
Explanation:
instructs the browser to display a dialog with an optional message prompting the user to input some text, and to wait until the user either submits the text or cancels the dialog
What is the best definition of dialect? will pay give me your cash app
a way of speaking that makes the actors’ lines easier to hear
a way of speaking that is specific to a certain group or location
a method of acting that relies on an actor’s own experiences
a method of acting that helps the audience follow the plot
You started writing a paper yesterday. You worked on it again today. After a few hours, you realized that you have introduced some major errors and decide that it would be better to go back to yesterday’s work and start from there. Which of these will be most helpful to you?
Track Changes
Permissions
Macros
Manage Document
Answer:
I think it is manage document.
Explanation:
managing helps us to organize things and write things with ease.
Answer:
Manage Document
Explanation: